Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Boost Mobile has warned an unspecified number of customers about unauthorized online account activity on March 14, 2019. [Read More]
The U.S. Justice Department announced charges against members of a hacking group operating in China allegedly responsible for the massive data breach at health insurer Anthem disclosed in 2015. [Read More]
Global information services giant Wolters Kluwer takes applications and platforms offline after discovering malware on its systems. [Read More]
Freedom Mobile, Canada's fourth largest mobile network operator, leaked the details of many customers, including their contact information, date of birth, and payment card data. [Read More]
French telecom giant Orange acquires Netherlands-based cybersecurity company SecureLink at a valuation of $577 million. [Read More]
Hackers have stolen over 7,000 bitcoins (worth over $40 million) after breaching the systems of Binance, one of the world’s largest cryptocurrency exchanges. [Read More]
Baltimore’s government on Tuesday rushed to shut down most of its computer servers after its network was hit by a ransomware virus. Officials believe it has not touched critical public safety systems. [Read More]
The Verizon 2019 Data Breach Investigations Report (DBIR) is the most extensive to date, with 73 contributors and an analysis of 41,686 security incidents including 2,013 confirmed breaches. [Read More]
Israel said it bombed a building housing Hamas cyber operatives in response to a cyberattack launched by the militant group over the weekend. [Read More]
Cybercriminals wipe GitHub, GitLab and Bitbucket repositories and ask for ransom in attacks involving compromised credentials. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Devon Kerr's picture
Organizations should plan beyond initial compromise and invest in technologies, personnel and methods that foster a more complete understanding.
Marc Solomon's picture
With a platform that can act as a virtual cybersecurity situation room, teams and team members can share the same pool of threat data and evidence to conduct investigations collaboratively.
Stan Engelbrecht's picture
Security teams should always be on the lookout for ways to become more proactive by predicting and anticipating their adversaries’ next moves
Marc Solomon's picture
Like the teams that progress through to the NCAA National Championship, you’ve now pared down “the threat landscape” to “your threat landscape” and set yourself up for success.
Gunter Ollmann's picture
As malware writers harness AI for cybercrime, the security industry must push forward with a new generation of dissection and detonation technologies to prepare for this coming wave.
Josh Lefkowitz's picture
It can be difficult for teams to determine how to obtain and incorporate data from encrypted chat service platforms into their collection strategies in a meaningful way.
Torsten George's picture
The anatomy of a hack has been glorified and led to the common belief that data breaches typically exploit zero-day vulnerabilities and require a tremendous amount of code sophistication.
Marc Solomon's picture
You need a way to ensure your threat hunting efforts are focused on high-risk threats and that the team is operating efficiently since time is the enemy.
Marc Solomon's picture
As a security professional, wouldn’t it be great to be able to focus on one thing at a time and know you’re focused on the right things to protect the organization?