Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A 2013 hack affected all three billion accounts at Yahoo, triple the original estimate, the online giant's parent company said Tuesday following a new analysis of the incident. [Read More]
Linux distros and tech companies warn customers about the Dnsmasq vulnerabilities discovered by Google [Read More]
Equifax on Monday afternoon said that 2.5 million additional U.S. consumers were exposed as a result of the massive data breach disclosed by the company last month. The credit reporting agency now says that total of 145.5 million individuals have been exposed. [Read More]
The security team at Equifax failed to patch a vulnerability in March after getting a warning about the flaw, opening up the credit agency to a breach affecting 143 million people, the former CEO said. [Read More]
Amazon-owned Whole Foods Market warns customers that their payment card data may have been stolen [Read More]
Fast food restaurant chain Sonic Drive-In apparently suffered a payment card breach that may affect millions of people [Read More]
Equifax chairman and CEO Richard Smith stepped down Tuesday, just weeks after the company disclosed a massive data breach that exposed more than 143 million U.S. individuals. [Read More]
Cloudflare says all customers will receive unmetered DDoS mitigation, and organizations will be able to select the geographical location of their SSL keys [Read More]
Deloitte said Monday that "very few" of the accounting and consultancy firm's clients were affected by a hack after a news report said systems of blue-chip clients had been breached. [Read More]
Department of Homeland Security finally notifies U.S. states whose voting systems were targeted by Russian hackers last year [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
Threat intelligence integration done right will allow you to act on threat intelligence efficiently and effectively using your existing security tools and services.
Rafal Los's picture
Don’t overlook the importance of having something that’s repeatable. To be repeatable, a process must be well-documented, well-understood and well-practiced.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.
Joshua Goldfarb's picture
The European Union’s General Data Protection Regulation includes an aspect that seems particularly relevant to the field of security operations and incident response.
Marc Solomon's picture
Security professionals want insights into the adversaries themselves – the tools as well as the tactics, techniques and procedures (TTPs) they’re using – to strengthen defenses and make life much more difficult for the bad guys.
Joshua Goldfarb's picture
Organizations should not be lured into a false sense of security if they deal in information or data that are not typically sought after by nation-state attackers.
Marc Solomon's picture
A threat intelligence platform (TIP) needs to operationalize and apply intelligence as the glue to reduce fragmentation.
Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.
Avi Chesla's picture
Security analysts are collecting all events, but are struggling to filter out non-relevant signals in an attempt to isolate the important events from the rest of the noise.
Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.