Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Samsung said that a “technical error” caused its website to display other customers’ personal information. [Read More]
Electronics protection company Slickwraps has revealed that user data was compromised recently after a third party accessed an unprotected database left accessible from the Internet. [Read More]
Workplace experience and facility management company ISS World was hit this week by a malware attack that forced its systems offline. [Read More]
FireEye’s M-Trends 2020 report says over 500 new malware families were identified last year and the global median dwell time has continued to drop. [Read More]
The U.S. Defence Information Systems Agency (DISA) has disclosed a 2019 data breach in which personal information may have been compromised. [Read More]
A ransomware infection at a U.S. natural gas compression facility resulted in a two-day operational shutdown of an entire pipeline asset. [Read More]
Puerto Rico’s government has suspended three employees as federal agents investigate an online scam that attempted to steal more than $4 million from the U.S. territory. [Read More]
Facebook this week said it removed three unrelated networks of accounts, pages, and groups that engaged in inauthentic behavior on behalf of foreign governments or threat actors. [Read More]
Cosmetic company Estée Lauder exposed 440 million records to the Internet in a database that was left accessible without proper protection, a security researcher says. [Read More]
Japanese defense contractors Pasco and Kobe Steel have disclosed cyber intrusions they suffered in 2016 and 2018. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
Visualization holds the key for quickly understanding patterns and determining which threads to pull.
Torsten George's picture
While the urge to hack back after a data breach is very appealing, going back to the basics and applying proper cyber hygiene is a better alternative.
Josh Lefkowitz's picture
No organization is fully immune to ransomware attacks, which is why having a comprehensive and well-tested incident response (IR) plan can make all the difference.
Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
Security teams have more internal system data than they know what to do with from sources including the SIEM system, log management repository, case management systems and security infrastructure. Security analysts struggle to make sense of too much data.
Josh Lefkowitz's picture
Request for intelligence (RFI) services have quickly become both ubiquitous and prone to misleading claims in the threat intelligence market.
Stan Engelbrecht's picture
Security teams need to incorporate intent-based response, behavior-based detection, and a kill chain perspective to get a step ahead of their adversaries.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.