Security Experts:

long dotted


Over 1 terabytes of data compiled by three Republican Party contractors, including the details of nearly 200 million American voters, exposed online [Read More]
U.S. fashion retailer Buckle informs customers that malware was present on PoS systems for nearly six months [Read More]
Cambridge, Mass-based Sqrrl -- one of the new breed of threat hunters -- has raised $12.3 million in Series C funding. [Read More]
US-CERT has issued an alert to warn organizations of North Korea’s Hidden Cobra activity, particularly one of its DDoS botnets [Read More]
Several flaws at risk of being exploited, including ones disclosed by Shadow Brokers, have been patched by Microsoft in Windows XP and other older versions of the OS [Read More]
GameStop finally confirms hackers stole personal and payment card data from its website - attackers had access between August 2016 and February 2017 [Read More]
Microsoft has agreed to acquire security orchestration firm Hexadite for an undisclosed sum. [Read More]
Many industrial firms admitted experiencing at least one security incident in the past 12 months, and large companies said such incidents cost them $500,000 per year [Read More]
Several researchers and security firms have teamed up to disrupt the infrastructure of the RIG exploit kit [Read More]
A government contractor has been charged for leaking a classified NSA report on Russia election hacking to The Intercept [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Adam Meyer's picture
With sound and timely operational threat intelligence, you can make life a lot harder for adversaries and have a much better understanding of how your organization is positioned against today's cyber threats.
Joshua Goldfarb's picture
All the activity around the WannaCry ransomware attack really did make me want to cry. But not for the reasons you might expect. So what was it that nearly brought me to tears?
Marc Solomon's picture
Threat intelligence integration done right will allow you to act on threat intelligence efficiently and effectively using your existing security tools and services.
Rafal Los's picture
Don’t overlook the importance of having something that’s repeatable. To be repeatable, a process must be well-documented, well-understood and well-practiced.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.
Joshua Goldfarb's picture
The European Union’s General Data Protection Regulation includes an aspect that seems particularly relevant to the field of security operations and incident response.
Marc Solomon's picture
Security professionals want insights into the adversaries themselves – the tools as well as the tactics, techniques and procedures (TTPs) they’re using – to strengthen defenses and make life much more difficult for the bad guys.
Joshua Goldfarb's picture
Organizations should not be lured into a false sense of security if they deal in information or data that are not typically sought after by nation-state attackers.
Marc Solomon's picture
A threat intelligence platform (TIP) needs to operationalize and apply intelligence as the glue to reduce fragmentation.
Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.