Security Experts:

long dotted


Baltimore’s government on Tuesday rushed to shut down most of its computer servers after its network was hit by a ransomware virus. Officials believe it has not touched critical public safety systems. [Read More]
The Verizon 2019 Data Breach Investigations Report (DBIR) is the most extensive to date, with 73 contributors and an analysis of 41,686 security incidents including 2,013 confirmed breaches. [Read More]
Israel said it bombed a building housing Hamas cyber operatives in response to a cyberattack launched by the militant group over the weekend. [Read More]
Cybercriminals wipe GitHub, GitLab and Bitbucket repositories and ask for ransom in attacks involving compromised credentials. [Read More]
Citrix said hackers had access to its network for five months and they may have stolen names, SSNs and financial information relating to current and former employees. [Read More]
Denver, Co-based managed detection and response (MDR) firm Red Canary has raised $34 million in growth equity funding. [Read More]
Global aluminium producer Norsk Hydro on Tuesday put the cost of a cyber attack targeting the Norwegian company in March at around $50 million. [Read More]
Docker Hub informs users of a data breach that impacted 190,000 accounts. Passwords have been reset and GitHub tokens and access keys have been revoked. [Read More]
Ireland’s privacy regulator says it’s investigating Facebook over the social media giant’s recent revelation that it had left hundreds of millions of user passwords exposed. [Read More], a popular website for fitness and bodybuilding enthusiasts, announced last week that hackers were able to access its systems. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
As a security professional, wouldn’t it be great to be able to focus on one thing at a time and know you’re focused on the right things to protect the organization?
Marc Solomon's picture
Most organizations have more intelligence than they know what to do with. What’s lacking is a way to aggregate all this data in one manageable location where it can be translated into a uniform format for analysis and action.
Jalal Bouhdada's picture
In the event of a cybersecurity incident in an industrial environment, you should follow a well-established seven step response process.
Marc Solomon's picture
How do we break this wasteful cycle and enable teams and technologies to reduce instances of false positives? The answer lies in prioritization and learning.
Stan Engelbrecht's picture
By highlighting phishing, which causes so many headaches for all us security professionals, you can see just how much of a game-changer automation can be for any SOC or CSIRT.
Marc Solomon's picture
Adversaries are increasingly masterful at taking advantage of these seams between technologies and teams to infiltrate organizations and remain below the radar.
Josh Lefkowitz's picture
There’s no point in having billions of data points if those data points aren’t timely, accurate, actionable, and adequately map to your intelligence objectives and requirements.
Erin O’Malley's picture
Like dog bites, the negative impact of cyber incidents can go from bad to worse quickly—and the first 48 hours are critical.
Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.