Security Experts:

long dotted


Bed Bath & Beyond says the accounts of less than 1% of its customers have been hacked in an attack that involved credentials obtained from third-party breaches and password reuse. [Read More]
Norsk Hydro estimates that the ransomware attack had a financial impact of up to $70 million in the first half of the year, of which its cyber insurance so far covered only $3.6 million. [Read More] and its subsidiaries Network Solutions and disclose a data breach that may have resulted in customer information being stolen [Read More]
U.S. fast-food restaurant chain Krystal is investigating a payment card breach that appears to impact at least 200 of its locations. [Read More]
The South African city of Johannesburg says it will not pay the ransom demanded by hackers who recently breached its IT systems. [Read More]
AWS customers experience service interruptions caused by a DDoS attack aimed at DNS servers. [Read More]
TorGuard and NordVPN respond to reports that their systems were breached, and both blamed the incident on a third-party service provider. [Read More]
An unknown threat actor managed to access Avast’s network in yet another supply chain compromise attempt. [Read More]
Ingredients giant Ingredion says a piece of malware infected some systems, which may result in customer and supplier transaction delays. [Read More]
Global shipping and ecommerce giant Pitney Bowes has blamed the recent security incident that caused some service disruptions on the Ryuk ransomware. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
Security teams have more internal system data than they know what to do with from sources including the SIEM system, log management repository, case management systems and security infrastructure. Security analysts struggle to make sense of too much data.
Josh Lefkowitz's picture
Request for intelligence (RFI) services have quickly become both ubiquitous and prone to misleading claims in the threat intelligence market.
Stan Engelbrecht's picture
Security teams need to incorporate intent-based response, behavior-based detection, and a kill chain perspective to get a step ahead of their adversaries.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.
Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.
Marc Solomon's picture
Security teams should be able to detect threats faster and use that knowledge to pivot and accelerate parallel investigations that are separate but related.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Marc Solomon's picture
Marc Solomon reviews the list of five characteristics to see how Gartner defined an intelligence-driven SOC four years ago and compare that list to where we are today.