Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The company sued two individuals for using browser extensions to scrape user profiles and other information from its website. [Read More]
Personal information on approximately 390,000 Capcom customers, business partners and other external parties possibly compromised in cyberattack. [Read More]
The Accellion service involved in the Reserve Bank of New Zealand breach is called FTA (File Transfer Application) and is used for file sharing. [Read More]
William Evanina, director of the U.S. National Counterintelligence and Security Center, said he expected to see a “growth” in the number of victims linked to the SolarWinds hack. [Read More]
The stolen documents were related to Pfizer and BioNTech’s COVID-19 vaccine candidate. [Read More]
Mimecast learned from Microsoft that one of its certificates was compromised by sophisticated threat actors, but the email security firm says impact is limited. [Read More]
German software maker SAP has published 10 bulletins with fixes for a range of serious security vulnerabilities. [Read More]
Microsoft's first batch of patches for 2021 includes a fix for a critical Microsoft Defender vulnerability that's been actively exploited. [Read More]
The U.S. chipmaker is adding hardware to the arsenal of tools available to defend against destructive and costly ransomware attacks. [Read More]
Ubiquity says no databases containing user data appear to have been accessed as a result of the data breach. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

AJ Nash's picture
For companies trying to build new or mature existing intelligence programs, the Age of COVID has been an excellent time to capture 30-60 minutes with that hard-to-find manager
Marc Solomon's picture
To push security operations forward, we must move towards a single, collaborative environment that can include threat hunters, incident handlers and threat intelligence and SOC analysts.
AJ Nash's picture
As you build your cyber intelligence program – and have all the vendors lined up to take your money – don’t overlook the importance of investing in the right people.
Marc Solomon's picture
Curated threat intelligence is an essential capability of the SOC, enabling tools and teams to work more efficiently and effectively to optimize everything from incident response to threat hunting.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Marc Solomon's picture
When intelligence becomes a capability and not just subscriptions to feeds, we can gain the full value of intelligence as the foundation to security operations.
Idan Aharoni's picture
As organizations’ visibility is limited to what their threat intelligence vendors cover, by definition they will never have full visibility.
Marc Solomon's picture
To gather the data and intelligence you need to fully detect and respond to threats, you need the ability to scale up and down the pyramid.
John Maddison's picture
By understanding the latest threat trends, security teams can take measures to ensure that their security strategies, including the identification and tracking of new IOCs, are being correctly updated.
Torsten George's picture
The risk of company employees walking away with sensitive data or selling their access credentials has never been greater now that a record number of individuals have been laid off.