Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Join SecurityWeek and Rapid7's Kimberlee Bachman for this interactive webcast as we discuss common questions about Managed Security Operations Centers (SOCs). [Read More]
FireEye releases FLARE VM, a free Windows-based security distribution designed for malware analysis, incident response and penetration testing [Read More]
Two Swedish ministers lost their jobs over a huge leak of sensitive data that has rocked the fragile centre-left government. [Read More]
Machine learning in cybersecurity is not a silver bullet. In fact, if machine learning can learn to detect malware, machine learning can learn to avoid detection by machine learning. [Read More]
Researcher tricks Symantec into revoking certificates based on forged private keys – Comodo did not fall for the same trick [Read More]
FedEx says TNT is still working on restoring critical systems affected by the NotPetya malware, but some data may never be recovered [Read More]
CrowdStrike and Dragos form strategic partnership to provide comprehensive ICS / SCADA security services. [Read More]
Rapid7 announced that it has acquired security orchestration and automation firm Komand for an undisclosed sum. [Read More]
Dow Jones has exposed the details of millions of customers via a misconfigured AWS S3 bucket [Read More]
Amendments to U.S. intelligence and defense policy bills include Russian and North Korean hacking, cybersecurity strategy, vulnerability disclosures, and information leaks [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.
Avi Chesla's picture
Security analysts are collecting all events, but are struggling to filter out non-relevant signals in an attempt to isolate the important events from the rest of the noise.
Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.
Steven Grossman's picture
While we all dream of solving the skills shortage by completely automating the entire detection and response process, it is simply unlikely to happen in the foreseeable future.
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Joshua Goldfarb's picture
It’s time to bring the capability to achieve a mature security posture through a robust security operations function to the masses.
Adam Meyer's picture
At the end of the day, whatever your cyber threat intelligence plan and process is, it should drive faster and smarter decisions that minimize your risk exposure.
Ashley Arbuckle's picture
There’s a lot organizations can do to strengthen their incident response capabilities so that they’re up to the test. Here are a few ways to take charge and ensure a better outcome...
Joshua Goldfarb's picture
Defenders must think more broadly about the risk they're trying to mitigate, rather than getting distracted and instituting one-off policies and solutions to new means that may arise.