Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Quantum Dawn IV, a large-scale exercise to test the cyber resiliency of the U.S. finance sector, had more than 900 participants from over 50 financial institutions, government agencies and regulators. [Read More]
Equifax on Thursday said that during the third quarter of 2017, it incurred $87.5 million in expenses related to the massive hack that was disclosed on September 7, 2017. [Read More]
Equifax said Friday an internal review found that four executives who sold shares ahead of disclosure of a massive data breach at the credit agency were unaware of the incident ahead of the sale. [Read More]
Hilton agrees to pay $700,000 in a settlement with New York and Vermont over the credit card breaches suffered by the company in 2014 and 2015 [Read More]
London's Heathrow Airport has launched an internal investigation after a memory stick containing extensive security information was found on a London street by a member of the public. [Read More]
American pharmaceutical giant Merck reported that the recent NotPetya attack caused hundreds of millions of dollars in losses [Read More]
The files encrypted by the Bad Rabbit ransomware can be recovered without paying the ransom, Kaspersky finds [Read More]
Kaspersky has shared preliminary results from its investigation into reports that Russian hackers stole NSA data from a contractor’s computer [Read More]
The Bad Rabbit ransomware attack that hit Russia and Ukraine has been linked to NotPetya, but the number of infections is far smaller [Read More]
Bermuda-based offshore legal firm Appleby said it was bracing for documents to be published after being approached by the media network behind the Panama Papers. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
Full automation ignores the key inputs from human intelligence. When it comes to “orient” and “decide,” the human element needs to be involved.
Joshua Goldfarb's picture
The way in which the security community typically reacts after certain high profile incidents is somewhat alarming. There are typically two responses, neither of which is particularly appropriate or helpful: Mocking and Ambulance chasing.
Adam Meyer's picture
Threat intelligence playbooks that support strategic and operational levels help teams be more effective, more certain in their actions and allow security programs to be agile/maintained as situations change.
Alastair Paterson's picture
The Equifax breach has had a damaging impact on the company and has put its customers at risk. But it has also served as a wake-up call for organizations around the globe.
Ashley Arbuckle's picture
MSSPs help alleviate the complexity of maintaining and managing a proliferation of security products and point solutions in order to get their full value.
Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.
Adam Meyer's picture
Want to hire the best analyst? Then first define what is usable and then focus your search on those characteristics.
Marc Solomon's picture
To more effectively prioritize to ensure relevance of threat intelligence, humans must be involved. After all, who understands your environment better than you?
Danelle Au's picture
How do you decide where to focus your security efforts to break the kill chain? Let’s take a look at three different approaches.
Marc Solomon's picture
Automatically recalculating and reevaluating priorities and threat assessments ensures you continue to stay focused on what is relevant to mitigate your organization’s risk.