Security Experts:

long dotted


Some Florida residents who have made unemployment claims may have had personal data stolen. [Read More]
Japan is investigating a possible leak of data including details of a prototype missile in a massive cyberattack earlier this year on Mitsubishi Electric. [Read More]
Verizon's Data Breach Investigations Report (DBIR) remains a fundamental asset for the discovery of existing and evolving threats, allowing practitioners to see where they should focus effort for an effective risk-based security posture. [Read More]
Microsoft has made some of its COVID-19 threat intelligence available to the public. [Read More]
Elexon, a company involved in managing the electricity market in the UK, reported being hit by a cyberattack that impacted its internal IT systems. [Read More]
Access to one of the most powerful supercomputers in the United Kingdom was suspended this week following a cyberattack. [Read More]
Enterprise identity protection company Semperis raises $40 million in a Series B funding round, which it will use to expand globally. [Read More]
After initially claiming that it found no evidence of data being stolen as a result of the recent ransomware attack, Australian shipping giant Toll has admitted that some data has been stolen. [Read More]
Cloud infrastructure provider DigitalOcean is informing customers that it inadvertently exposed some of their data to the Internet. [Read More]
New York state's top prosecutor announces that the company Zoom would improve security measures, after flaws were detected as the video conferencing platform soared in popularity amid the coronavirus pandemic. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Josh Lefkowitz's picture
No organization is fully immune to ransomware attacks, which is why having a comprehensive and well-tested incident response (IR) plan can make all the difference.
Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
Security teams have more internal system data than they know what to do with from sources including the SIEM system, log management repository, case management systems and security infrastructure. Security analysts struggle to make sense of too much data.
Josh Lefkowitz's picture
Request for intelligence (RFI) services have quickly become both ubiquitous and prone to misleading claims in the threat intelligence market.
Stan Engelbrecht's picture
Security teams need to incorporate intent-based response, behavior-based detection, and a kill chain perspective to get a step ahead of their adversaries.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.
Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.