Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Computer networks of Garmin were coming back online Monday after an outage widely believed to have been due to a ransomware attack. [Read More]
Computer networks of smartwatch and electronics firm Garmin were offline July 24 in an incident which raised concerns of a ransomware attack affecting both its aviation and fitness app services. [Read More]
Twitter says an elected Dutch official was among 36 account holders whose direct message inboxes were accessed in a recent high-profile hack. [Read More]
A genealogy website used to catch one of California’s most wanted serial killers remained shut down Thursday after a security breach exposed the DNA profiles of more than a million people to law enforcement agencies. [Read More]
Twitter on Wednesday revealed that attackers accessed the direct message (DM) inboxes of some of the accounts that were compromised in last week’s security incident. [Read More]
Beijing accused the United States of "slander" after two Chinese nationals were indicted for seeking to steal coronavirus vaccine research and hacking hundreds of companies. [Read More]
DeepSource has reset tokens, secrets, private keys, and employee credentials after being informed that its GitHub application was compromised. [Read More]
US charges two Chinese hackers for stealing hundreds of millions of dollars of trade secrets from companies across the world and more recently targeting firms developing a vaccine for the coronavirus. [Read More]
Cloud software provider Blackbaud has admitted that it paid cybercriminals to regain control of data following a ransomware attack in May 2020. [Read More]
Social media platform Twitter has confirmed that attackers downloaded user data from some of the accounts compromised in last week’s security incident. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
Marc Solomon's picture
With capabilities to quickly curate and integrate new threat data sources across your operations, you’re prepared for whatever the future brings.
John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.
Jim Ducharme's picture
Heightened anxiety is a normal consequence of drastic change, and it’s natural for the entire organization to be stressed by the shift to a fully remote work environment.
Preston Hogue's picture
The healthcare industry will need advanced security measures to identify and mitigate flaws in new apps carrying the world’s most sensitive, regulated information.
Marc Solomon's picture
The LEAD threat intelligence framework is a perfect example of the symbiosis between technology and people to strengthen security posture.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Gunter Ollmann's picture
While defense scoring lowers the barrier to sharing defensive success insights, it does not yet address the insights gained from learning from others’ failures and the stigma of a breach.