Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The National Security Agency (NSA) released its 2020 Cybersecurity Year in Review report, which summarizes the NSA Cybersecurity Directorate's first full year of operation. [Read More]
Bitdefender has released a free decryptor for DarkSide, a piece of ransomware that allegedly helped cybercriminals make millions from targeted companies. [Read More]
User credentials, personally identifiable information, and other types of data belonging to United Nations Environment Programme employees exposed. [Read More]
Following the recent attack on the U.S. Capitol, where a parade of people stormed the building and gained access to unprotected computers, industry professionals share thoughts on what they would do if they were in charge of cybersecurity at an organization that could end up in a similar situation. [Read More]
Multiple serious security vulnerabilities were addressed in GPU drivers and vGPU software. [Read More]
Ongoing coverage of the SolarWinds Orion attacks and useful resources, including analysis and indicators of compromise (IOC). Check back often for updates. [Read More]
SolarWinds has hired a newly formed cybersecurity consulting firm founded by Chris Krebs, former CISA director, and Alex Stamos, former security chief at Facebook and Yahoo. [Read More]
The CSET bureau will focus on international cyberspace security and policy issues. [Read More]
An investigation has been launched into the impact of the SolarWinds breach on U.S. federal courts, which reportedly were considered a target of interest by the hackers. [Read More]
Red Hat buys an innovative container security startup and announced plans to open-source the technology at a later date. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
While it may be a trendy term, in cybersecurity, intelligence pivoting is pivotal to detection and response.
Joshua Goldfarb's picture
A healthy dose of self-doubt can go a long way towards keeping us on our toes and continually improving the security posture of our respective organizations.
Idan Aharoni's picture
The term "Threat Intelligence" encompasses an ever-growing set of offerings that, on an operational standpoint, have different use cases.
Marc Solomon's picture
Security tools need to integrate with a centralized repository of relevant, prioritized threat intelligence, and with all your security controls.
Rafal Los's picture
More security tools can increase your cost, increase overall complexity, and eventually decrease your organization's ability to be effective.
AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
Marc Solomon's picture
With capabilities to quickly curate and integrate new threat data sources across your operations, you’re prepared for whatever the future brings.
John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.