Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Apple’s initial analysis shows that the iPhone and Mac exploits disclosed by WikiLeaks have already been patched, and the company told WikiLeaks to submit vulnerabilities through the normal process [Read More]
A 'Discussion Draft' bill called the Active Cyber Defense Certainty Act would remove parts of the CFAA that effectively prevent private business from taking their own action against hackers. [Read More]
Hundreds of Cisco switches are affected by a critical zero-day vulnerability found by the vendor during its analysis of WikiLeaks’ Vault 7 files [Read More]
Turkish hackers abuse Twitter Counter app to hijack many high-profile Twitter accounts over the diplomatic dispute between Turkey and the Netherlands [Read More]
Home Depot has agreed to pay banks $25 million as part of a settlement over the 2014 data breach [Read More]
Financially motivated attackers have become just as sophisticated as state-sponsored actors, says FireEye in 2017 M-Trends report [Read More]
Industry professionals comment on the CIA hacking tools detailed by WikiLeaks and the implications of the Vault7 leak [Read More]
CIA responds to WikiLeaks Vault 7 dump: it’s our job to be innovative and cutting-edge, but we don’t spy on fellow Americans [Read More]
Apple and Google are confident that most of the vulnerabilities used by the CIA do not affect the latest versions of their products [Read More]
Verifone is investigating a breach that it has described as "a limited cyber intrusion" into its corporate network." [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Ashley Arbuckle's picture
There’s a lot organizations can do to strengthen their incident response capabilities so that they’re up to the test. Here are a few ways to take charge and ensure a better outcome...
Joshua Goldfarb's picture
Defenders must think more broadly about the risk they're trying to mitigate, rather than getting distracted and instituting one-off policies and solutions to new means that may arise.
Marc Solomon's picture
Threat intelligence that incorporates external and internal data can go a long way toward helping you mitigate breaches during the holiday shopping frenzy.
Travis Greene's picture
Unlike the political arena, or even other divisions of the technology industry, when working in IT security, people rarely notice when everything is done perfectly.
Avi Chesla's picture
It's time to consider whether proactive defense strategies exist in the realm of real battlefields.
Scott Simkin's picture
Don’t expect to plug a cybersecurity specialist into the role of threat intelligence analyst, as the jobs require different skill sets.
Adam Meyer's picture
Cyber threat intelligence can help further optimize your incident response processes so that you can not only respond faster and better, but also reduce adversary opportunity and in turn go through fewer incident response fire drills.
Joshua Goldfarb's picture
Security has evolved to the point that I can now say that collection, sensing, and alerting are yesterday’s news.
Ashley Arbuckle's picture
What it takes to operate security operation center (SOC) effectively has changed in this ever-evolving threat landscape, putting an even greater burden on analysts and the technologies they rely upon.
Rocky DeStefano's picture
Hadoop — with its ability to ingest, process and provide analytics for nearly untold amounts of data — is being adopted to solve many of the cybersecurity challenges we face.