Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

German authorities have seized a computer server that hosted a huge cache of files from scores of U.S. federal, state and local law enforcement agencies obtained in a Houston data breach last month. [Read More]
EDP Renewables North America has admitted that a recent cyberattack aimed at its parent company, which involved ransomware, also resulted in hackers accessing its own systems. [Read More]
The threat actor behind the Sodinokibi (REvil) ransomware is demanding a $14 million ransom from Brazilian-based electrical energy company Light S.A. [Read More]
China on Wednesday demanded Washington stop “oppressing Chinese companies” after U.S. regulators declared telecom equipment suppliers Huawei and ZTE to be national security threats. [Read More]
Australia unveiled the "largest-ever" boost in cybersecurity spending, days after Prime Minister Scott Morrison spoke out about a wave of state-sponsored attacks suspected to have been carried out by China. [Read More]
University of California San Francisco (UCSF) revealed that it paid roughly $1.14 million to cybercriminals to recover data encrypted during a ransomware attack earlier this month. [Read More]
A data breach has impacted Maine State Police’s information sharing database for federal, state and local law enforcement officials, the agency confirmed late Friday. [Read More]
Many companies view the SOC as a key part of their security strategy, but SOC staff complain about high stress and the lack of proper tools. [Read More]
Australian beverage company Lion says there is no evidence that hackers have stolen information from its systems, but the hackers claim they have and are threatening to leak it. [Read More]
The cybercriminals behind the Maze ransomware claim they hacked LG and obtained highly sensitive information. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
Visualization holds the key for quickly understanding patterns and determining which threads to pull.
Torsten George's picture
While the urge to hack back after a data breach is very appealing, going back to the basics and applying proper cyber hygiene is a better alternative.
Josh Lefkowitz's picture
No organization is fully immune to ransomware attacks, which is why having a comprehensive and well-tested incident response (IR) plan can make all the difference.
Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
Security teams have more internal system data than they know what to do with from sources including the SIEM system, log management repository, case management systems and security infrastructure. Security analysts struggle to make sense of too much data.
Josh Lefkowitz's picture
Request for intelligence (RFI) services have quickly become both ubiquitous and prone to misleading claims in the threat intelligence market.
Stan Engelbrecht's picture
Security teams need to incorporate intent-based response, behavior-based detection, and a kill chain perspective to get a step ahead of their adversaries.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.