Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Industry professionals comment on the Equifax hack, which may affect as many as 143 million people [Read More]
Major companies report losing hundreds of millions of dollars due to the recent NotPetya malware outbreak [Read More]
Vulnerabilities found by a researcher in solar panels may allow hackers to disrupt power grids, but the affected vendor says his claims are greatly exaggerated [Read More]
The NotPetya malware attack caused a disruption of worldwide operations for pharma giant Merck [Read More]
FedEx says TNT is still working on restoring critical systems affected by the NotPetya malware, but some data may never be recovered [Read More]
WWE left unencrypted personal details of more than 3 million customers exposed on AWS in at least two separate databases. [Read More]
SecurityWeek’s CISO Forum was specifically designed to bring together senior level security executives in an intimate environment for the ultimate exchange of knowledge and insights [Read More]
Yahoo said the forged cookie attack affected 32 million users and the company admitted that the 2014 breach was not investigated properly [Read More]
Recently disclosed SHA-1 collision attack has a serious effect on repositories using Apache Subversion (SVN) system [Read More]
Qualys this week announced new tools and features to provide customers with improved detection capabilities, expanded web application security features, and improved vulnerability data sharing. [Read More]

FEATURES, INSIGHTS // Disaster Recovery

rss icon

Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
A multi-layered breach detection and recovery plan is a must to protect your organization, making the difference between a catastrophic breach that devastates your business and a breach that’s quickly contained and terminated.
Chris Poulin's picture
There’s no one size fits all disaster survival plan: a server compromise is vastly different than full scale nuclear attack, and both require situationally appropriate responses.
Danelle Au's picture
What can we glean from "Superstorm" Sandy that will help us deal with security events as disruptive in nature as Super Storm Sandy? Do we need a strategic shift in how we respond to incidents? What are key security observations from this storm?
Rod Rasmussen's picture
In the security and privacy world, 2012 is turning out to be the year for Internet security bills. But why now and why so many Internet protection bills suddenly coming up in Congress?
Ram Mohan's picture
The Amazon Web Services Cloud Outage showed the world that the cloud — while great — does not absolve companies from taking fundamental precautions to safeguard their systems online.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!