Security Experts:

long dotted


A threat actor was able to compromise the network of a federal agency and create a reverse proxy and install malware, CISA reported on Thursday. [Read More]
Tyler Technologies, a major provider of software and services for the U.S. government, has confirmed that the recently disclosed cybersecurity incident involved ransomware. [Read More]
E-commerce platform Shopify has disclosed a security incident involving two rogue support employees who accessed customer data without authorization. [Read More]
Facebook said Tuesday it derailed a network of fakes accounts out of China that had recently taken aim at the US presidential race. [Read More]
Experts have identified an unprotected Elasticsearch server that contained terabytes of data pertaining to users of Microsoft’s Bing mobile application. [Read More]
Kognos has emerged from stealth mode with an autonomous XDR platform that uses AI to help organizations efficiently detect, investigate and respond to attacks. [Read More]
Mozilla is discontinuing the Send feature in Firefox due to the fact that it has been abused to deliver malware and phishing attacks. [Read More]
U.S. FERC and NERC release a report outlining cyber incident response and recovery best practices for electric utilities. [Read More]
U.S. Department of Treasury announces sanctions against Iran-based threat actor APT39, associated individuals, and a front company named Rana. [Read More]
Researchers at Temple University have been tracking ransomware attacks on critical infrastructure and they are providing the data for free. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
Marc Solomon's picture
With capabilities to quickly curate and integrate new threat data sources across your operations, you’re prepared for whatever the future brings.
John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.
Jim Ducharme's picture
Heightened anxiety is a normal consequence of drastic change, and it’s natural for the entire organization to be stressed by the shift to a fully remote work environment.
Preston Hogue's picture
The healthcare industry will need advanced security measures to identify and mitigate flaws in new apps carrying the world’s most sensitive, regulated information.
Marc Solomon's picture
The LEAD threat intelligence framework is a perfect example of the symbiosis between technology and people to strengthen security posture.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Gunter Ollmann's picture
While defense scoring lowers the barrier to sharing defensive success insights, it does not yet address the insights gained from learning from others’ failures and the stigma of a breach.
AJ Nash's picture
Elevating from the Cyber threat intelligence (CTI) team concept to an “intelligence team” concept is the next generation of intelligence practice within the private sector.