The personal information of more than one million patients was impacted in a March 2022 incident at patient care guidelines provider MCG Health. [Read More]
Firmware supply chain security company Binarly has announced a $3.6 million seed funding round led by Westwave Capital and Acrobator Ventures. [Read More]
Cyberint, a threat intelligence startup competing in the attack surface management category, has raised $40 million in financing led by StageOne Late Stage Arm. [Read More]
SYN Ventures is leading a $23 million Series A investment in RevealSecurity, a startup building technology to thwart malicious insider threats. [Read More]
A survey conducted by Fortinet shows that over 40% of cybersecurity incidents at OT organizations resulted in operational outages that put physical safety at risk. [Read More]
Nearly 30 cybersecurity M&A deals were announced in the first half of June 2022, the highest number since SecurityWeek has been tracking M&A activity. [Read More]
Disguised as a cryptocurrency miner, Malibot focuses on stealing financial information, cryptocurrency wallets, and personally identifiable information (PII). [Read More]
If you know for a fact that a person or group has poor intentions, it may make sense to begin documenting and reporting nefarious activity you observe from them.
Many think open source intelligence is just another name for better googling. They are wrong. Good open source and threat intelligence are derived from three core capabilities.
Vendor agnostic technology, married with actionable, globally-sourced, and continually evolving intelligence, augmented by humans, is needed to defend our enterprises.
There are areas where governments can learn from the private sector and vice-versa, which will help both sides adapt more quickly and effectively to a continuously evolving threat environment.
I foresee a convergence of the tooling for telemetry aggregation, threat detection, managed services and remediation as a key milestone in the evolution of the modern SOC.
While we may not be able to fix the organizational issues created by a “Peter”, by identifying the signs that we are working for one, we can often adjust how we work to compensate.
By scoping job descriptions realistically and incorporating automation and intelligence sharing to enable analyst success and growth, there’s a lot that security leaders can do to help close the skills gap in their organizations.