Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

EU adopts Law Enforcement Emergency Response Protocol for major cross-border cyberattacks. [Read More]
For a second year in a row, NASA’s cybersecurity program gets failing grade from the Office of Inspector General. [Read More]
Flashpoint announces new service designed to help organizations respond and prepare for ransomware and other cyber extortion incidents [Read More]
Atlanta information management head Daphne Rackley told the City Council that the Atlanta ransomware attack was far more serious than originally thought, and will require an additional $9.5 million to recover. [Read More]
NATO’s Locked Shields 2018 exercise tested the skills of cyber defenders from 30 countries in protecting IT systems and critical infrastructure [Read More]
Senator who conducted 4-month investigation into Equifax breach wants answers after credit agency admits that hackers accessed types of data not mentioned in initial disclosure [Read More]
The massive 2016 breach that Uber covered up for more than a year was the work of a couple of individuals from Canada and Florida [Read More]
Danish shipping giant Maersk revealed that it had to restore nearly 50,000 PCs and servers following the NotPetya attack [Read More]
UK-based Clarkson, one of the world’s largest shipping companies, informed the public that it suffered a data breach and hackers may release some data [Read More]
American pharmaceutical giant Merck reported that the recent NotPetya attack caused hundreds of millions of dollars in losses [Read More]

FEATURES, INSIGHTS // Disaster Recovery

rss icon

Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
A multi-layered breach detection and recovery plan is a must to protect your organization, making the difference between a catastrophic breach that devastates your business and a breach that’s quickly contained and terminated.
Chris Poulin's picture
There’s no one size fits all disaster survival plan: a server compromise is vastly different than full scale nuclear attack, and both require situationally appropriate responses.
Danelle Au's picture
What can we glean from "Superstorm" Sandy that will help us deal with security events as disruptive in nature as Super Storm Sandy? Do we need a strategic shift in how we respond to incidents? What are key security observations from this storm?
Rod Rasmussen's picture
In the security and privacy world, 2012 is turning out to be the year for Internet security bills. But why now and why so many Internet protection bills suddenly coming up in Congress?
Ram Mohan's picture
The Amazon Web Services Cloud Outage showed the world that the cloud — while great — does not absolve companies from taking fundamental precautions to safeguard their systems online.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!