Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

DHS publishes the National Cyber Incident Response Plan (NCIRP), which describes the role of federal agencies when dealing with cyber incidents [Read More]
Ukraine’s national power company Ukrenergo has confirmed that the December outage was caused by a cyberattack [Read More]
The latest power outages in Ukraine may have been caused by a cyberattack, according to the national energy company Ukrenergo [Read More]
Madison County, Indiana, was the victim of ransomware last week. According to Madison County Commissioner John Richwine, it followed the directions of its insurance carrier in how to respond to the attack. [Read More]
Barnstable Police Department survived a ransomware attack without paying any ransom, thanks to a disaster recovery solution. [Read More]
Hackers breached the systems of anti-adblocking service PageFair and used the access to deliver malware [Read More]
Sony Pictures organized a town hall-style meeting with staff Monday to discuss the massive cyber attack on the Hollywood studio, a day after hackers promised a big "Christmas gift." [Read More]
Sony Pictures Entertainment pressed media outlets against using data hackers may have leaked about the studio. [Read More]
A recent security bulletin released by Microsoft as part of the August 2014 Patch Tuesday can lead to a crash on some systems, the company said in a knowledge base article. [Read More]
Kaspersky Lab announced major leadership changes to its North American operations this week, while at the same time revealing its strategic plans for expansion in the enterprise IT security market. [Read More]

FEATURES, INSIGHTS // Disaster Recovery

rss icon

Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
A multi-layered breach detection and recovery plan is a must to protect your organization, making the difference between a catastrophic breach that devastates your business and a breach that’s quickly contained and terminated.
Chris Poulin's picture
There’s no one size fits all disaster survival plan: a server compromise is vastly different than full scale nuclear attack, and both require situationally appropriate responses.
Danelle Au's picture
What can we glean from "Superstorm" Sandy that will help us deal with security events as disruptive in nature as Super Storm Sandy? Do we need a strategic shift in how we respond to incidents? What are key security observations from this storm?
Rod Rasmussen's picture
In the security and privacy world, 2012 is turning out to be the year for Internet security bills. But why now and why so many Internet protection bills suddenly coming up in Congress?
Ram Mohan's picture
The Amazon Web Services Cloud Outage showed the world that the cloud — while great — does not absolve companies from taking fundamental precautions to safeguard their systems online.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!