Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Organizations are getting better at detecting breaches on their own, but it still takes them a long time to do it, according to a new report from CrowdStrike. [Read More]
Google will close the consumer version of its online social network sooner than originally planned due to the discovery of a new software bug. [Read More]
The Linux.org community website was defaced after someone hacked its registrar account and hijacked DNS settings. [Read More]
A new class action lawsuit filed against Marriott following the massive data breach alleges that the hotel giant still exposes customer information. [Read More]
Some clues left behind by the hackers that breached Marriott suggest that they were conducting cyber espionage on behalf of the Chinese government, Reuters reports. [Read More]
Facebook chief Mark Zuckerberg pushed back Wednesday against emails showing the social media giant offering Netflix and other popular apps preferential access to people's data even after it had tightened its privacy rules. [Read More]
Attorneys General from 12 states announce that the first multistate HIPAA-related data breach lawsuit has been filed against Medical Informatics Engineering and NoMoreClipboard after they allowed hackers to steal the information of 3.9 million individuals. [Read More]
Thousands of emails were stolen from the hacked accounts of aides to the National Republican Congressional Committee (NRCC) during the 2018 midterm campaign. [Read More]
Hackers may have stolen information on 100 million users after breaching the systems of question-and-answer website Quora. [Read More]
Sen. Charles Schumer says Marriott hotel officials should pay for new passports for customers whose passport numbers were hacked as part of a massive data breach. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
How do we break this wasteful cycle and enable teams and technologies to reduce instances of false positives? The answer lies in prioritization and learning.
Stan Engelbrecht's picture
By highlighting phishing, which causes so many headaches for all us security professionals, you can see just how much of a game-changer automation can be for any SOC or CSIRT.
Marc Solomon's picture
Adversaries are increasingly masterful at taking advantage of these seams between technologies and teams to infiltrate organizations and remain below the radar.
Josh Lefkowitz's picture
There’s no point in having billions of data points if those data points aren’t timely, accurate, actionable, and adequately map to your intelligence objectives and requirements.
Erin O’Malley's picture
Like dog bites, the negative impact of cyber incidents can go from bad to worse quickly—and the first 48 hours are critical.
Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
Preston Hogue's picture
Technical hacks to gain entry into sensitive systems are still an important part of the equation, but today they are just one tool in a much larger toolkit.
Marc Solomon's picture
Collaboration holds the key to improved time to detection and response, so teams can better address the concerns that permeate the organization when a large-scale attack happens.
Marc Solomon's picture
ThreatQuotient's Marc Solomon talks with Glen Jones, senior director of Identity and Risk Products at Visa, to discuss on cyber threat and payment card data protection.