Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Facebook has partially restored the View As feature abused by hackers last year in a massive data breach that affected 29 million accounts. [Read More]
Boost Mobile has warned an unspecified number of customers about unauthorized online account activity on March 14, 2019. [Read More]
The U.S. Justice Department announced charges against members of a hacking group operating in China allegedly responsible for the massive data breach at health insurer Anthem disclosed in 2015. [Read More]
Global information services giant Wolters Kluwer takes applications and platforms offline after discovering malware on its systems. [Read More]
Freedom Mobile, Canada's fourth largest mobile network operator, leaked the details of many customers, including their contact information, date of birth, and payment card data. [Read More]
French telecom giant Orange acquires Netherlands-based cybersecurity company SecureLink at a valuation of $577 million. [Read More]
Hackers have stolen over 7,000 bitcoins (worth over $40 million) after breaching the systems of Binance, one of the world’s largest cryptocurrency exchanges. [Read More]
Baltimore’s government on Tuesday rushed to shut down most of its computer servers after its network was hit by a ransomware virus. Officials believe it has not touched critical public safety systems. [Read More]
The Verizon 2019 Data Breach Investigations Report (DBIR) is the most extensive to date, with 73 contributors and an analysis of 41,686 security incidents including 2,013 confirmed breaches. [Read More]
Israel said it bombed a building housing Hamas cyber operatives in response to a cyberattack launched by the militant group over the weekend. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
Preston Hogue's picture
Technical hacks to gain entry into sensitive systems are still an important part of the equation, but today they are just one tool in a much larger toolkit.
Marc Solomon's picture
Collaboration holds the key to improved time to detection and response, so teams can better address the concerns that permeate the organization when a large-scale attack happens.
Marc Solomon's picture
ThreatQuotient's Marc Solomon talks with Glen Jones, senior director of Identity and Risk Products at Visa, to discuss on cyber threat and payment card data protection.
Ashley Arbuckle's picture
Through security orchestration and automation, you can gather threat intelligence from the cloud, translate it into a useable format and create new blacklists.
Stan Engelbrecht's picture
Stan Engelbrecht takes a look at how automation and orchestration can replace chaos with order, and how security folks in management positions can benefit from this needed change.
Lance Cottrell's picture
Actively investigating and infiltrating criminal groups online is not “hacking back,” but it may provoke that as a response.
Josh Lefkowitz's picture
A downfall of automation in security is the fact that even some of the most sophisticated tools aren’t always capable of blocking all the threats they were designed to block.
Travis Greene's picture
How you view security operations will make a difference in how fast your organization can deliver software and mitigate breach damage.