Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

U.S. Justice Department’s Cyber-Digital Task Force publishes first report, covering the threat to elections, cybercrime schemes, FBI’s role in incident response, and cyber personnel recruitment [Read More]
A new report was compiled after Tom Kellermann, chief cybersecurity officer at Carbon Black, was tired of seeing reports that are focused on just the vector of attack -- how they got in versus how they stay in. [Read More]
Singapore’s Ministry of Health (MOH) said that a Singapore Health Services database containing patient data, including personal information on Prime Minister Lee Hsien Loong, was hit by a “major” cyberattack. [Read More]
HR services firm ComplyRight informs customers of a security incident involving its tax reporting platform. Personal information of many individuals possibly compromised [Read More]
Burlington, North Carolina-based LabCorp took some of its systems offline last weekend after discovering that some had been infected by ransomware. [Read More]
Flashpoint announces new service designed to help organizations respond and prepare for ransomware and other cyber extortion incidents [Read More]
Timehop has shared more details on the recent data breach, including what the hacker did on its systems and what other type of information was compromised [Read More]
Facebook could face a hefty compensation bill in Australia after a leading litigation funder lodged a complaint with the country's privacy regulator over users' personal data shared with a British political consultancy [Read More]
German web hosting firm DomainFactory shuts down forum following data breach. Hacker gained access to sensitive data, including banking information [Read More]
Hackers gained access to Timehop systems in December 2017, but the breach was only discovered on July 4. The incident affects 21 million users [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
In a virtual cybersecurity situation room, team members can collaborate on investigations to detect threats faster, accelerate response and even anticipate what the future may hold.
Marc Solomon's picture
It is important for threat intelligence analysts, SOCs and incident responders to work together to take the right actions faster, reducing the time to response and remediation.
Marc Solomon's picture
The industry needs to share a common understanding of how to put threat intelligence into practice to address some of our thorniest security operations challenges.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?
Lance Cottrell's picture
Discussions around hacking back in Congress today rely on analogies that are too simple and use examples focused on physical self-defense that fail to capture the true nature of online interactions.
Marc Solomon's picture
It isn’t sufficient for security teams to prevent, detect and respond to attacks. Security teams also must be able to proactively investigate and understand what the latest, large-scale cyber campaign means to their organization.
Justin Fier's picture
When we look at this cycle of stealthy and silent data breaches, we have to ask ourselves: how can such tremendous amounts of data leave our corporate networks without raising any alarms?
Alastair Paterson's picture
Security teams need visibility outside the organization and across the widest range of data sources possible to mitigate digital risk and better protect the organization.
Steven Grossman's picture
Identifying those kinds of repeated non-malicious behaviors amongst a group of peers can help identify broken business processes that are requiring employees to violate policy in order to do their job.
Stan Engelbrecht's picture
Post-incident activity is the often-neglected phase where organizations try to answer the questions of what happened, why, and how can we make sure it doesn’t happen again?