Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

OneLogin shares more details on the breach suffered this week, including the method of attack and customer impact [Read More]
Department store chain Kmart informed customers that its payment systems were infected with malware - second card breach in recent years [Read More]
Identity and access management firm OneLogin suffers breach at US data center - customer information compromised [Read More]
Researcher discovers unprotected Amazon S3 bucket storing sensitive military data belonging to a US combat support and intelligence agency [Read More]
Many organizations believe an attack on their medical devices will likely occur in the next year, but few are taking significant steps to prevent attacks [Read More]
Retailer Target agrees to pay $18.5 million to 47 U.S. states as part of a settlement over the massive data breach suffered by the company in 2013 [Read More]
Medical devices also infected with WannaCry ransomware. Several manufacturers release security advisories [Read More]
More than 200 Brooks Brothers stores hit by payment card breach. Hackers had access to payment processing systems for nearly a year [Read More]
Hackers breached DocuSign systems and stole email addresses, which they used in a spam campaign designed to deliver malware [Read More]
HP has removed the keylogger functionality found by researchers in audio drivers provided for 28 laptops and tablet PCs [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Avi Chesla's picture
Security analysts are collecting all events, but are struggling to filter out non-relevant signals in an attempt to isolate the important events from the rest of the noise.
Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.
Steven Grossman's picture
While we all dream of solving the skills shortage by completely automating the entire detection and response process, it is simply unlikely to happen in the foreseeable future.
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Joshua Goldfarb's picture
It’s time to bring the capability to achieve a mature security posture through a robust security operations function to the masses.
Adam Meyer's picture
At the end of the day, whatever your cyber threat intelligence plan and process is, it should drive faster and smarter decisions that minimize your risk exposure.
Ashley Arbuckle's picture
There’s a lot organizations can do to strengthen their incident response capabilities so that they’re up to the test. Here are a few ways to take charge and ensure a better outcome...
Joshua Goldfarb's picture
Defenders must think more broadly about the risk they're trying to mitigate, rather than getting distracted and instituting one-off policies and solutions to new means that may arise.
Marc Solomon's picture
Threat intelligence that incorporates external and internal data can go a long way toward helping you mitigate breaches during the holiday shopping frenzy.