Security Experts:

long dotted


Several lawsuits filed against Marriott after the company disclosed a data breach impacting 500 million Starwood customers. [Read More]
Appeals court upholds the U.S. government’s ban on Kaspersky Lab software, rejecting claims that the decision is an unconstitutional legislative punishment. [Read More]
NATO running Cyber Coalition 2018, the alliance's biggest cyber warfare exercise [Read More]
Marriott International warned that data on roughly 500 million customers staying at Starwood hotel properties had been compromised in a cyberattack that gave unknown attackers access to the Starwood network since 2014. [Read More]
Dell resets user passwords for after detecting an attempt to steal customer information, including names, addresses and hashed passwords [Read More]
Industry professionals comment on reports that a vulnerability in an API used by USPS exposed the data of 60 million customers [Read More]
Data breach at healthcare technology provider AccuDoc resulted in the exposure of information belonging to 2.65 million Atrium Health patients [Read More]
Microsoft shares information on the root cause of the massive outage that impacted its Azure Active Directory authentication services across Europe, Asia and the Americas [Read More]
Uber has been fined the equivalent of nearly $1.2 million by British and Dutch authorities for failing to protect customers’ data during a cyberattack in 2016 [Read More]
Australian HR software firm PageUp says it has found no evidence that data was stolen as a result of the data breach suffered this year [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Ashley Arbuckle's picture
Through security orchestration and automation, you can gather threat intelligence from the cloud, translate it into a useable format and create new blacklists.
Stan Engelbrecht's picture
Stan Engelbrecht takes a look at how automation and orchestration can replace chaos with order, and how security folks in management positions can benefit from this needed change.
Lance Cottrell's picture
Actively investigating and infiltrating criminal groups online is not “hacking back,” but it may provoke that as a response.
Josh Lefkowitz's picture
A downfall of automation in security is the fact that even some of the most sophisticated tools aren’t always capable of blocking all the threats they were designed to block.
Travis Greene's picture
How you view security operations will make a difference in how fast your organization can deliver software and mitigate breach damage.
John Maddison's picture
Agile software and application development add a layer of abstraction and complexity that modern security tools are simply unable to secure.
Erin O’Malley's picture
Like big game hunting, cyber threat hunting is not easy and requires a unique mix of hard-earned skills and intelligence.
Torsten George's picture
The Reddit data breach illustrates the importance of rolling out an approach designed to verify the user, validate their device, limit access and privilege, and learn and adapt to new risks.
Stan Engelbrecht's picture
Security orchestration, automation, and response (SOAR) tools are increasingly effective for some of today’s most pressing security problems, which has led to growing demand across enterprise organizations.
Marc Solomon's picture
The human element will always remain vital in security operations, but automation will allow us to move through processes faster for better decisions and accelerated action.