Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cybersecurity agencies in Australia, Canada, New Zealand, the United Kingdom, and the United States have published a joint advisory on detecting malicious activity and incident response. [Read More]
The American Payroll Association (APA) says user information was stolen after attackers managed to inject a skimmer on its website. [Read More]
New Zealand's spy agency has been brought in to help fight back against cyberattacks that crippled the country's stock exchange for a fourth straight day on Friday. [Read More]
The failed attempt by Russian hackers to recruit an employee to install malware onto an enterprise network was targeting electric car maker Tesla, a tweet from Elon Musk confirms. [Read More]
Cyber attacks forced New Zealand's stock exchange to halt trading Thursday for the third time in as many days, its operator said Thursday, just as the country's corporate reporting season gets underway. [Read More]
Palo Alto Networks has agreed to acquire incident response and digital forensics consulting firm The Crypsis Group. [Read More]
The University of Utah on Thursday revealed that it paid approximately $457,000 to ransomware operators after servers in its College of Social and Behavioral Science (CSBS) were compromised. [Read More]
Former Uber chief security officer Joe Sullivan has been charged for allegedly trying to cover up the 2016 security breach that resulted in the information of millions of drivers and users getting stolen. [Read More]
The SANS Institute says the recently disclosed security incident involved phishing emails being sent to several of its employees. [Read More]
Microsoft has rolled out an update for Windows Defender after Citrix customers noticed that some services stopped working after being detected as malware. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
While it may be a trendy term, in cybersecurity, intelligence pivoting is pivotal to detection and response.
Joshua Goldfarb's picture
A healthy dose of self-doubt can go a long way towards keeping us on our toes and continually improving the security posture of our respective organizations.
Idan Aharoni's picture
The term "Threat Intelligence" encompasses an ever-growing set of offerings that, on an operational standpoint, have different use cases.
Marc Solomon's picture
Security tools need to integrate with a centralized repository of relevant, prioritized threat intelligence, and with all your security controls.
Rafal Los's picture
More security tools can increase your cost, increase overall complexity, and eventually decrease your organization's ability to be effective.
AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
Marc Solomon's picture
With capabilities to quickly curate and integrate new threat data sources across your operations, you’re prepared for whatever the future brings.
John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.