Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Premera Blue Cross, the largest health insurer in the Pacific Northwest, has agreed to pay $10 million to 30 states following an investigation into a data breach that exposed confidential information on more than 10 million people across the country. [Read More]
Google contractors regularly listen to and review some recordings of what people say to artificial-intelligence system Google Assistant, via their phone or through smart speakers such as the Google Home. [Read More]
An Exploit Prevention update released recently by McAfee for Endpoint Security is blocking Windows users from logging on to their systems, and some major organizations appear to be affected. [Read More]
Hackers breached the archive server for the Pale Moon open source web browser and infected all .exe files with malware. [Read More]
Marriott International says it will fight a large fine resulting from a massive data breach that was discovered in 2018. [Read More]
Marriott says it will fight a $123 million U.K. government fine related to its massive data breach. [Read More]
LaPorte County, Indiana has been affected by a malware attack that disabled computer and email systems. [Read More]
The Maryland Department of Labor announced that databases containing personally identifiable information (PII) were accessed in a cyber-incident discovered earlier this year. [Read More]
UK data watchdog says it intends to fine British Airways £183.39 million ($230 million) for the 2018 data breach that impacted 500,000 of its customers. [Read More]
Laboratory testing services giant Eurofins Scientific reportedly paid the ransom in response to a ransomware attack that led to many systems and servers being taken offline. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.
Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.
Marc Solomon's picture
Security teams should be able to detect threats faster and use that knowledge to pivot and accelerate parallel investigations that are separate but related.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Marc Solomon's picture
Marc Solomon reviews the list of five characteristics to see how Gartner defined an intelligence-driven SOC four years ago and compare that list to where we are today.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Devon Kerr's picture
Organizations should plan beyond initial compromise and invest in technologies, personnel and methods that foster a more complete understanding.
Marc Solomon's picture
With a platform that can act as a virtual cybersecurity situation room, teams and team members can share the same pool of threat data and evidence to conduct investigations collaboratively.
Stan Engelbrecht's picture
Security teams should always be on the lookout for ways to become more proactive by predicting and anticipating their adversaries’ next moves