Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Company confirms cybercriminals used malware to steal payment card data from nearly 40 Shoney’s restaurants [Read More]
Microsoft assures customers that the latest Shadow Brokers exploits have already been patched, including several with March updates [Read More]
Video gaming retail company Gamestop appears to have been breached, with an unknown number of customers' payment card details stolen. [Read More]
British payday loan company Wonga suffers data breach. The incident could affect up to 270,000 current and former customers [Read More]
The International Association of Athletics Federations (IAAF) says Fancy Bear cyberspies breached its systems and accessed athlete medical records [Read More]
Hackers stole the personal data of about 95,000 job seekers from McDonald's Canada recruitment website over the past three years. [Read More]
A hacker gained access to the names, dates of birth and SSNs of job seekers in 10 U.S. states after breaching the systems of America’s JobLink (AJL) [Read More]
Google is displeased that Symantec failed to oversee issuance of certificates by its partners and wants Chrome to gradually distrust all current certificates [Read More]
The server hosting Android Forums was hacked and the website’s database was accessed. Only 2.5% of active users affected [Read More]
Apple’s initial analysis shows that the iPhone and Mac exploits disclosed by WikiLeaks have already been patched, and the company told WikiLeaks to submit vulnerabilities through the normal process [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Joshua Goldfarb's picture
Organizations should not be lured into a false sense of security if they deal in information or data that are not typically sought after by nation-state attackers.
Marc Solomon's picture
A threat intelligence platform (TIP) needs to operationalize and apply intelligence as the glue to reduce fragmentation.
Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.
Avi Chesla's picture
Security analysts are collecting all events, but are struggling to filter out non-relevant signals in an attempt to isolate the important events from the rest of the noise.
Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.
Steven Grossman's picture
While we all dream of solving the skills shortage by completely automating the entire detection and response process, it is simply unlikely to happen in the foreseeable future.
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Joshua Goldfarb's picture
It’s time to bring the capability to achieve a mature security posture through a robust security operations function to the masses.
Adam Meyer's picture
At the end of the day, whatever your cyber threat intelligence plan and process is, it should drive faster and smarter decisions that minimize your risk exposure.