Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The Pentagon said there has been a cyber breach of Defense Department travel records that compromised the personal information and credit card data of U.S. military and civilian personnel. [Read More]
Facebook said that hackers accessed personal data of 29 million users in a breach at the world's leading social network disclosed late last month. [Read More]
A group of United States senators sent a letter to Google, urging it to provide an internal memo that supposedly explains why the company did not disclose the Google+ data exposure that was discovered in March. [Read More]
Industry professionals comment on recent Google+ security incident involving a bug that exposed personal information from 500,000 accounts [Read More]
Security Orchestration, Automation and Response (SOAR) firm Demisto has raised $43 million in a Series C funding round led by Greylock partners. [Read More]
Google was supposed to be focusing on its launch of a new smartphone and other devices, but the event was being overshadowed by a firestorm over a privacy glitch that forced it to shut down its struggling social network. [Read More]
In a letter to Congress, Apple says the Bloomberg story on Chinese spy chips is "simply wrong" [Read More]
The US Department of Homeland Security and the UK National Cyber Security Centre deny investigating the presence of Chinse spy chips in Supermicro servers [Read More]
Industry professionals comment on reports that China planted spy chips in Super Micro servers used by Amazon, Apple and many other organizations in the US [Read More]
Tiny chips inserted in US computer equipment manufactured in China were used as part of a vast effort by Beijing to steal US technology secrets, a published report said Thursday. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
Preston Hogue's picture
Technical hacks to gain entry into sensitive systems are still an important part of the equation, but today they are just one tool in a much larger toolkit.
Marc Solomon's picture
Collaboration holds the key to improved time to detection and response, so teams can better address the concerns that permeate the organization when a large-scale attack happens.
Marc Solomon's picture
ThreatQuotient's Marc Solomon talks with Glen Jones, senior director of Identity and Risk Products at Visa, to discuss on cyber threat and payment card data protection.
Ashley Arbuckle's picture
Through security orchestration and automation, you can gather threat intelligence from the cloud, translate it into a useable format and create new blacklists.
Stan Engelbrecht's picture
Stan Engelbrecht takes a look at how automation and orchestration can replace chaos with order, and how security folks in management positions can benefit from this needed change.
Lance Cottrell's picture
Actively investigating and infiltrating criminal groups online is not “hacking back,” but it may provoke that as a response.
Josh Lefkowitz's picture
A downfall of automation in security is the fact that even some of the most sophisticated tools aren’t always capable of blocking all the threats they were designed to block.
Travis Greene's picture
How you view security operations will make a difference in how fast your organization can deliver software and mitigate breach damage.