Security Experts:

long dotted


7,960 hours of triaging would take more than 47 employees doing nothing but triaging 24 hours a day, seven days a week. [Read More]
The massive 2016 breach that Uber covered up for more than a year was the work of a couple of individuals from Canada and Florida [Read More]
Business Wire has been under a sustained Distributed Denial of Service (DDoS) attack for almost a week, causing disruptions to its online web portal. [Read More]
Adobe patches CVE-2018-4878, the Flash Player zero-day vulnerability exploited by North Korean hackers in attacks aimed at South Korea [Read More]
Cisco reissues patches for critical vulnerability affecting its security appliances after finding new attack vectors and additional affected features [Read More]
Japanese officials have suggested Coincheck lacked proper security measures, making itself vulnerable to theft. [Read More]
South Korea’s Internet & Security Agency issues alert for Adobe Flash Player zero-day vulnerability reportedly exploited in attacks by North Korea [Read More]
AMD’s Zen 2 and future processors will include protections against exploits such as the recently disclosed Spectre, the company’s CEO said [Read More]
Official website of the phpBB forum software served malicious packages for 3 hours last week. Up to 500 users may have downloaded the files [Read More]
An update delivered by Malwarebytes to home and enterprise users caused serious problems, including Web connection issues, high memory usage, and crashes [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Ashley Arbuckle's picture
MSSPs help alleviate the complexity of maintaining and managing a proliferation of security products and point solutions in order to get their full value.
Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.
Adam Meyer's picture
Want to hire the best analyst? Then first define what is usable and then focus your search on those characteristics.
Marc Solomon's picture
To more effectively prioritize to ensure relevance of threat intelligence, humans must be involved. After all, who understands your environment better than you?
Danelle Au's picture
How do you decide where to focus your security efforts to break the kill chain? Let’s take a look at three different approaches.
Marc Solomon's picture
Automatically recalculating and reevaluating priorities and threat assessments ensures you continue to stay focused on what is relevant to mitigate your organization’s risk.
Adam Meyer's picture
With sound and timely operational threat intelligence, you can make life a lot harder for adversaries and have a much better understanding of how your organization is positioned against today's cyber threats.
Joshua Goldfarb's picture
All the activity around the WannaCry ransomware attack really did make me want to cry. But not for the reasons you might expect. So what was it that nearly brought me to tears?
Marc Solomon's picture
Threat intelligence integration done right will allow you to act on threat intelligence efficiently and effectively using your existing security tools and services.
Rafal Los's picture
Don’t overlook the importance of having something that’s repeatable. To be repeatable, a process must be well-documented, well-understood and well-practiced.