Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Home Depot agreed to a $17.5 million settlement with the attorney generals of 46 states and the District of Columbia over the massive data breach suffered by the home improvement retailer in 2014. [Read More]
Japanese video game giant Capcom this week confirmed that a large amount of data was stolen from its systems during a ransomware attack several weeks ago. [Read More]
Federal regulators are requiring Zoom to strengthen its security in a proposed settlement of allegations that the video conferencing service misled users about its level of security for meetings. [Read More]
The United States this week announced that it seized 27 domain names that were employed by Iran’s Islamic Revolutionary Guard Corps (IRGC) to spread disinformation. [Read More]
The Vermont Army National Guard’s Combined Cyber Response Team is helping the University of Vermont Health Network respond to last week’s cyberattack. [Read More]
Britain's data privacy watchdog on Friday said it has fined US hotels group Marriott over a data breach affecting millions of customers worldwide. [Read More]
SecurityWeek Exclusive: The results of 13 million medical examinations relating to around 3.5 million U.S. patients are unprotected and available to anyone on the internet. [Read More]
A hacker attack against an upstate New York county’s computer system raised concern that some emailed absentee ballot applications may not be processed, but the state Board of Elections said voting won’t be affected overall. [Read More]
Fragomen, a law firm that provides Google with I-9 employment verification compliance services, says personal information of some people was compromised in a recent data breach. [Read More]
A problem that halted trading on the Paris stock market and others across Europe was a "middleware" issue and not a cyber attack, operator Euronext said Tuesday. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Marc Solomon's picture
When intelligence becomes a capability and not just subscriptions to feeds, we can gain the full value of intelligence as the foundation to security operations.
Idan Aharoni's picture
As organizations’ visibility is limited to what their threat intelligence vendors cover, by definition they will never have full visibility.
Marc Solomon's picture
To gather the data and intelligence you need to fully detect and respond to threats, you need the ability to scale up and down the pyramid.
John Maddison's picture
By understanding the latest threat trends, security teams can take measures to ensure that their security strategies, including the identification and tracking of new IOCs, are being correctly updated.
Torsten George's picture
The risk of company employees walking away with sensitive data or selling their access credentials has never been greater now that a record number of individuals have been laid off.
Marc Solomon's picture
While it may be a trendy term, in cybersecurity, intelligence pivoting is pivotal to detection and response.
Joshua Goldfarb's picture
A healthy dose of self-doubt can go a long way towards keeping us on our toes and continually improving the security posture of our respective organizations.
Idan Aharoni's picture
The term "Threat Intelligence" encompasses an ever-growing set of offerings that, on an operational standpoint, have different use cases.
Marc Solomon's picture
Security tools need to integrate with a centralized repository of relevant, prioritized threat intelligence, and with all your security controls.