Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

As a result of massive backlash from the industry, CTS Labs has provided some clarifications about the AMD processor vulnerabilities and its disclosure method [Read More]
Mossack Fonseca, the law firm at the heart of the "Panama Papers" will shut down operations, citing negative press and what it called unwarranted action by authorities. [Read More]
An unnamed energy firm in the U.S. has been fined $2.7 million over a data security incident that exposed critical cyber assets [Read More]
The SEC has charged Jun Ying, former chief information officer (CIO) of a business unit of Equifax with insider trading in connection with the massive data breach disclosed in late 2017. [Read More]
AMD is investigating claims of critical flaws in its processors, while the company that found the vulnerabilities faces backlash over its disclosure method [Read More]
According to the Micro Focus 2018 State of Security Operations Report, security operations centers (SOCs) are becoming more efficient, but there is still considerable scope for improvement. [Read More]
A China-linked cyber espionage group used new backdoors in an attack aimed at a company that provides services to the UK government [Read More]
Investigation into the September 2017 CCleaner incident reveals what appears to be a stage 3 payload that attackers supposedly intended to deliver to infected users [Read More]
Corero finds “kill switch” for the Memcached vulnerability that has fueled some of the largest distributed DDoS attacks in history [Read More]
Over 160 RMH-owned Applebee’s restaurants had their PoS systems infected with malware designed to capture payment card information [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.
Adam Meyer's picture
Want to hire the best analyst? Then first define what is usable and then focus your search on those characteristics.
Marc Solomon's picture
To more effectively prioritize to ensure relevance of threat intelligence, humans must be involved. After all, who understands your environment better than you?
Danelle Au's picture
How do you decide where to focus your security efforts to break the kill chain? Let’s take a look at three different approaches.
Marc Solomon's picture
Automatically recalculating and reevaluating priorities and threat assessments ensures you continue to stay focused on what is relevant to mitigate your organization’s risk.
Adam Meyer's picture
With sound and timely operational threat intelligence, you can make life a lot harder for adversaries and have a much better understanding of how your organization is positioned against today's cyber threats.
Joshua Goldfarb's picture
All the activity around the WannaCry ransomware attack really did make me want to cry. But not for the reasons you might expect. So what was it that nearly brought me to tears?
Marc Solomon's picture
Threat intelligence integration done right will allow you to act on threat intelligence efficiently and effectively using your existing security tools and services.
Rafal Los's picture
Don’t overlook the importance of having something that’s repeatable. To be repeatable, a process must be well-documented, well-understood and well-practiced.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.