Security Experts:

long dotted


Yahoo slashed the price of the sale of its core Internet business to Verizon by $350 million following a pair of major data breaches at Yahoo, the two companies announced Tuesday. [Read More]
Breach that may have affected many major organizations comes to light after nearly two years. Links found to Chinese APTs [Read More]
CompTIA has announced CSA+, a new security qualification which focuses on the skills required for the use of threat detection tools, data analysis and the interpretation of results to identify vulnerabilities, threats and risks. [Read More]
Implementation bug allowed an attacker to create 370,000 Zcoins and make a profit of over $400,000 [Read More]
Yahoo is notifying some users that hackers may have been able to use a maneuver to break into their accounts without stealing passwords. [Read More]
IBM's Watson is ready to help security analysts sift through network alerts thrown up by the QRadar security intelligence platform in what IBM calls its Cognitive SOC. [Read More]
RSA improves several products and launches new services as it unveils its Business-Driven Security offering [Read More]
The Department of Homeland Security published a new report providing additional indicators of compromise (IOC) and analysis using the phases of the cyber kill chain to detect and mitigate threats from the Russia-linked GRIZZLY STEPPE hackers. [Read More]
Demisto, a Cupertino, Calif.-based maker of software that helps Security Operations team fight “alert fatigue” and reduce the time to respond to a breach has raised $20 million Series B round of funding. [Read More]
Hundreds of Arby’s restaurants affected by breach. Hundreds of thousands of credit and debit cards compromised [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
Threat intelligence that incorporates external and internal data can go a long way toward helping you mitigate breaches during the holiday shopping frenzy.
Travis Greene's picture
Unlike the political arena, or even other divisions of the technology industry, when working in IT security, people rarely notice when everything is done perfectly.
Avi Chesla's picture
It's time to consider whether proactive defense strategies exist in the realm of real battlefields.
Scott Simkin's picture
Don’t expect to plug a cybersecurity specialist into the role of threat intelligence analyst, as the jobs require different skill sets.
Adam Meyer's picture
Cyber threat intelligence can help further optimize your incident response processes so that you can not only respond faster and better, but also reduce adversary opportunity and in turn go through fewer incident response fire drills.
Joshua Goldfarb's picture
Security has evolved to the point that I can now say that collection, sensing, and alerting are yesterday’s news.
Ashley Arbuckle's picture
What it takes to operate security operation center (SOC) effectively has changed in this ever-evolving threat landscape, putting an even greater burden on analysts and the technologies they rely upon.
Rocky DeStefano's picture
Hadoop — with its ability to ingest, process and provide analytics for nearly untold amounts of data — is being adopted to solve many of the cybersecurity challenges we face.
Ashley Arbuckle's picture
But by asking these key questions you can understand what’s required to proactively detect and respond to today’s malicious and complex attacks.
Joshua Goldfarb's picture
Everyone loves a pretty picture or a slick graph, but very rarely do these supposed visualizations add any real value to security operations.