Security Experts:

long dotted


FireEye surveyed over 800 cybersecurity executives from around the world and most of them believe cybersecurity solutions are either inexpensive or their cost is reasonable for the value they provide. [Read More]
More details have emerged on the March cyberattack on a U.S. power utility: the victim was renewable energy provider sPower and the attackers exploited a vulnerability in Cisco firewalls. [Read More]
Bed Bath & Beyond says the accounts of less than 1% of its customers have been hacked in an attack that involved credentials obtained from third-party breaches and password reuse. [Read More]
Norsk Hydro estimates that the ransomware attack had a financial impact of up to $70 million in the first half of the year, of which its cyber insurance so far covered only $3.6 million. [Read More] and its subsidiaries Network Solutions and disclose a data breach that may have resulted in customer information being stolen [Read More]
U.S. fast-food restaurant chain Krystal is investigating a payment card breach that appears to impact at least 200 of its locations. [Read More]
The South African city of Johannesburg says it will not pay the ransom demanded by hackers who recently breached its IT systems. [Read More]
AWS customers experience service interruptions caused by a DDoS attack aimed at DNS servers. [Read More]
TorGuard and NordVPN respond to reports that their systems were breached, and both blamed the incident on a third-party service provider. [Read More]
An unknown threat actor managed to access Avast’s network in yet another supply chain compromise attempt. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Joshua Goldfarb's picture
When the security of our organization depends on us leaving our comfort zone, how can we ensure that we accomplish what we set out to do without putting the organization at additional risk?
Marc Solomon's picture
National Cybersecurity Awareness Month (NCSAM) is a great vehicle to raise awareness for cybersecurity and to remind every organization that the ability to improve security operations begins with contextual awareness.
Josh Lefkowitz's picture
Here’s a crash-course on the intelligence cycle and how you can apply and derive value from its core principles—no matter your role or security discipline:
Marc Solomon's picture
Five things you should know about incident pruning and how to apply it to improve investigations, threat hunting and incident response.
Josh Lefkowitz's picture
A use case-centric approach to threat intelligence can yield substantial benefits and is absolutely worth pursuing. It just needs to be pursued properly.
Marc Solomon's picture
Visualization holds the key for quickly understanding patterns and determining which threads to pull.
Torsten George's picture
While the urge to hack back after a data breach is very appealing, going back to the basics and applying proper cyber hygiene is a better alternative.
Josh Lefkowitz's picture
No organization is fully immune to ransomware attacks, which is why having a comprehensive and well-tested incident response (IR) plan can make all the difference.
Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.