Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

US officials and cyber experts warned Tuesday that the voting debacle in the Democratic caucuses in Iowa underscored the vulnerabilities in the country's election infrastructure in everything from hacking to trust-eroding conspiracy theories. [Read More]
A new Maryland bill would ask the state’s Department of Information Technology to develop a baseline plan for localities within the state to help battle cyber attacks. [Read More]
Australian transportation and logistics giant Toll Group was forced to shut down some of its customer apps in response to a ransomware attack. [Read More]
A newly launched project wants to help inform IT security representatives and domain owners when their users fall victim to phishing. [Read More]
A leaked internal confidential document from the United Nations (UN) says that dozens of servers were “compromised” at UN offices in Geneva and Vienna. [Read More]
The 2020 DEF CON 2.0 China hacking conference has been put on hold as the country is fighting the coronavirus outbreak. [Read More]
After observing an increase in the number of fraudulent transactions, Google over the weekend announced that it halted the publishing of paid items to the Chrome Web Store. [Read More]
Researchers were able to access private personal information of more than 30,000 medical marijuana patients, recreational pot customers or dispensary employees in several states. [Read More]
Citrix has released a new set of patches for the recently disclosed CVE-2019-19781 vulnerability and partnered with FireEye for a tool that tells users if their systems have been compromised via the security flaw. [Read More]
Paying off hackers after a ransomware infection could end up being a total loss, according to a study released Thursday which finds some attackers just take the money and run. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.
Marc Solomon's picture
Security teams should be able to detect threats faster and use that knowledge to pivot and accelerate parallel investigations that are separate but related.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Marc Solomon's picture
Marc Solomon reviews the list of five characteristics to see how Gartner defined an intelligence-driven SOC four years ago and compare that list to where we are today.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Devon Kerr's picture
Organizations should plan beyond initial compromise and invest in technologies, personnel and methods that foster a more complete understanding.
Marc Solomon's picture
With a platform that can act as a virtual cybersecurity situation room, teams and team members can share the same pool of threat data and evidence to conduct investigations collaboratively.
Stan Engelbrecht's picture
Security teams should always be on the lookout for ways to become more proactive by predicting and anticipating their adversaries’ next moves
Marc Solomon's picture
Like the teams that progress through to the NCAA National Championship, you’ve now pared down “the threat landscape” to “your threat landscape” and set yourself up for success.