Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The agency's guidance is aimed at three main decision-maker groups and should help reduce overall risks associated with Managed Service Providers (MSPs). [Read More]
Microsoft’s embattled security response unit is scrambling to deal with another zero-day attack hitting users of its flagship Microsoft Office software suite. [Read More]
T-Mobile’s CEO and an individual who claims to have hacked the company have shared some information about how the recent attack was carried out. [Read More]
A small Swiss town acknowledged that it had underestimated the severity of a cyberattack, following reports the personal data of the entire population was exposed online. [Read More]
BreachQuest launches with $4.4 million in seed funding and a goal to modernize cyber incident response. [Read More]
The company said it fell victim to a Conti ransomware attack that included the exfiltration of personal information pertaining to current and former employees. [Read More]
The University of Toronto's Citizen Lab finds a new iOS zero-click exploit in an iPhone surveillance campaign targeting bloggers, activists and dissidents in Bahrain. [Read More]
XDR company Hunters raises $30 million in a Series B funding round that brings the total raised to over $50 million. [Read More]
Class action lawsuits have been filed against T-Mobile over the recently disclosed data breach that has been confirmed to impact over 50 million customers. [Read More]
The bank says a technical issue exposed customers’ personal information to customers with similar information. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Landon Winkelvoss's picture
Security and intelligence teams often lack finished intelligence, which leaves them ill-equipped to combat motivated and sophisticated adversaries.
Marc Solomon's picture
Security is a big data problem. Solving it is all about prioritized data flow, continuously processing data for analysis and translating and exporting it to create a single security infrastructure.
Tim Bandos's picture
The more you identify within your threat hunting program, the more opportunity you may have at expanding with additional budget. Never let an incident go to waste.
Rob Fry's picture
We are a community with grand ideas around the concept of crowdsourced threat intel (CTI), but with little history or previous successes that show CTI as a viable idea.
Marc Solomon's picture
For efficiency and effectiveness, automation must take a data-driven approach and encompass how we initiate and learn from the response, not just how we execute the process.
Landon Winkelvoss's picture
In response to a specific attack, it’s important to do external threat monitoring and threat actor engagement to determine if the actors are attempting to exploit or monetize the security event.
Marc Solomon's picture
As Security Operations Centers (SOCs) mature and transition to become detection and response organizations, they need to tackle some tough challenges with respect to data, systems and people.
Gunter Ollmann's picture
Once live stomping around vendor-packed expo halls at security conferences returns, it is highly probable that “Virtual Analyst” will play a starring role in buzzword bingo.
Marc Solomon's picture
To gain a comprehensive understanding of the threats you are facing and what you must defend, you need to start by aggregating internal data from across the entire ecosystem
Marc Solomon's picture
The center of gravity of the Security Operations Center (SOC) used to be the SIEM, but this is shifting as the mission of the SOC shifts to become a detection and response organization.