Security Experts:

long dotted


Airbus played down the risk of cyberattacks and said it had "appropriate measures" to mitigate any danger after an AFP investigation revealed a series of hacking incidents targeting the European aerospace giant. [Read More]
German car parts and defense firm Rheinmetall says production at its automotive plants in the US, Brazil and Mexico was disrupted as a result of a malware attack. [Read More]
A survey of 3,000 CISOs in Europe shows that while many feel burned out and have considered leaving the industry, a vast majority are 'thrilled' by their work and fully immersed. [Read More]
Wyoming-based Campbell County Memorial Hospital continues to experience service disruptions after a ransomware attack hit Campbell County Health’s computer systems on Friday. [Read More]
More than 20,000 records from eight cities across the United States have been compromised in a new wave of Click2Gov breaches. [Read More]
Over 200,000 people have signed a petition demanding that the FTC holds Equifax properly accountable for the data breach that impacted 148 million Americans in 2017. [Read More]
Authorities are investigating an apparent hack and customer data leak at Lion Air, which also affected Lion units Batik Air and Wings Air. [Read More]
The US Justice Department filed a lawsuit against Edward Snowden seeking to prevent the former CIA employee and National Security Agency contractor from profiting from his new book. [Read More]
Industry professionals comment on a report that an unprotected database may have exposed the details of nearly everyone in Ecuador. [Read More]
Australia reportedly determined that China hacked its parliament and political parties, but decided not to make public accusations to avoid disrupting trade relations. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Josh Lefkowitz's picture
Request for intelligence (RFI) services have quickly become both ubiquitous and prone to misleading claims in the threat intelligence market.
Stan Engelbrecht's picture
Security teams need to incorporate intent-based response, behavior-based detection, and a kill chain perspective to get a step ahead of their adversaries.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.
Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.
Marc Solomon's picture
Security teams should be able to detect threats faster and use that knowledge to pivot and accelerate parallel investigations that are separate but related.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Marc Solomon's picture
Marc Solomon reviews the list of five characteristics to see how Gartner defined an intelligence-driven SOC four years ago and compare that list to where we are today.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.