Security Experts:

long dotted


Qualcomm’s Snapdragon mobile processors are vulnerable to Spectre and Meltdown attacks due to the use of ARM technology [Read More]
Industry professionals comment on the Meltdown and Spectre attacks exploiting security holes in Intel, AMD and ARM processors [Read More]
An increasing number of companies in the industrial sector reported experiencing a targeted attack, according to a Kaspersky survey of nearly 1,000 organizations [Read More]
Intel has started releasing software and firmware updates to protect devices against Meltdown and Spectre attacks. Updates expected for most CPUs by the end of next week [Read More]
Microsoft, Amazon, ARM, Google, Apple and others have addressed the Meltdown and Spectre vulnerabilities affecting CPUs [Read More]
Information on nearly a quarter million Department of Homeland Security (DHS) employees was released as part of an "unauthorized transfer of data", the DHS announced. [Read More]
Devices with Intel, AMD and ARM CPUs are vulnerable to Meltdown and Spectre attacks, which can allow hackers to obtain passwords and other sensitive information [Read More]
Clothing retailer Forever 21 informed customers that malware collected data from its payment systems for a period of more than 7 months [Read More]
Nissan Canada is informing more than 1.1 million customers that their personal information may have been compromised as a result of a data breach [Read More]
Google warns DoubleClick customers that some of the files provided by third-party vendors through its advertising platform can introduce XSS vulnerabilities [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Danelle Au's picture
How do you decide where to focus your security efforts to break the kill chain? Let’s take a look at three different approaches.
Marc Solomon's picture
Automatically recalculating and reevaluating priorities and threat assessments ensures you continue to stay focused on what is relevant to mitigate your organization’s risk.
Adam Meyer's picture
With sound and timely operational threat intelligence, you can make life a lot harder for adversaries and have a much better understanding of how your organization is positioned against today's cyber threats.
Joshua Goldfarb's picture
All the activity around the WannaCry ransomware attack really did make me want to cry. But not for the reasons you might expect. So what was it that nearly brought me to tears?
Marc Solomon's picture
Threat intelligence integration done right will allow you to act on threat intelligence efficiently and effectively using your existing security tools and services.
Rafal Los's picture
Don’t overlook the importance of having something that’s repeatable. To be repeatable, a process must be well-documented, well-understood and well-practiced.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.
Joshua Goldfarb's picture
The European Union’s General Data Protection Regulation includes an aspect that seems particularly relevant to the field of security operations and incident response.
Marc Solomon's picture
Security professionals want insights into the adversaries themselves – the tools as well as the tactics, techniques and procedures (TTPs) they’re using – to strengthen defenses and make life much more difficult for the bad guys.
Joshua Goldfarb's picture
Organizations should not be lured into a false sense of security if they deal in information or data that are not typically sought after by nation-state attackers.