Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Slack launches Enterprise Key Management, an Enterprise Grid add-on feature that gives organizations total control over their encryption keys. [Read More]
EU adopts Law Enforcement Emergency Response Protocol for major cross-border cyberattacks. [Read More]
Google said it took down 2.3 billion bad ads in 2018, including 58.8 million phishing ads. [Read More]
Chinese e-commerce giant Gearbest exposed user data through unprotected databases. The company has downplayed the incident and blamed it on an error made by a member of its security team. [Read More]
Two lawmakers believe the U.S. Senate should inform senators about successful hacker attacks against the organization’s systems. [Read More]
For a second year in a row, NASA’s cybersecurity program gets failing grade from the Office of Inspector General. [Read More]
The massive Equifax data breach in 2017 was the result of years of poor cybersecurity practices, a new report from the United States Senate’s Permanent Subcommittee on Investigations reveals. [Read More]
An Iran-linked threat group tracked as IRIDIUM is said to be behind an attack on software giant Citrix, but some people are not convinced the attribution is accurate. [Read More]
The Venezuelan government claims a massive power outage that has hit the country was caused by a cyberattack and a cyberattack also prevented authorities from restoring power. [Read More]
Secureworks launches Orchestration and Automation solution that can help organizations better protect their systems. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
You need a way to ensure your threat hunting efforts are focused on high-risk threats and that the team is operating efficiently since time is the enemy.
Marc Solomon's picture
As a security professional, wouldn’t it be great to be able to focus on one thing at a time and know you’re focused on the right things to protect the organization?
Marc Solomon's picture
Most organizations have more intelligence than they know what to do with. What’s lacking is a way to aggregate all this data in one manageable location where it can be translated into a uniform format for analysis and action.
Jalal Bouhdada's picture
In the event of a cybersecurity incident in an industrial environment, you should follow a well-established seven step response process.
Marc Solomon's picture
How do we break this wasteful cycle and enable teams and technologies to reduce instances of false positives? The answer lies in prioritization and learning.
Stan Engelbrecht's picture
By highlighting phishing, which causes so many headaches for all us security professionals, you can see just how much of a game-changer automation can be for any SOC or CSIRT.
Marc Solomon's picture
Adversaries are increasingly masterful at taking advantage of these seams between technologies and teams to infiltrate organizations and remain below the radar.
Josh Lefkowitz's picture
There’s no point in having billions of data points if those data points aren’t timely, accurate, actionable, and adequately map to your intelligence objectives and requirements.
Erin O’Malley's picture
Like dog bites, the negative impact of cyber incidents can go from bad to worse quickly—and the first 48 hours are critical.
Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.