Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Australia unveiled the "largest-ever" boost in cybersecurity spending, days after Prime Minister Scott Morrison spoke out about a wave of state-sponsored attacks suspected to have been carried out by China. [Read More]
University of California San Francisco (UCSF) revealed that it paid roughly $1.14 million to cybercriminals to recover data encrypted during a ransomware attack earlier this month. [Read More]
A data breach has impacted Maine State Police’s information sharing database for federal, state and local law enforcement officials, the agency confirmed late Friday. [Read More]
Many companies view the SOC as a key part of their security strategy, but SOC staff complain about high stress and the lack of proper tools. [Read More]
Australian beverage company Lion says there is no evidence that hackers have stolen information from its systems, but the hackers claim they have and are threatening to leak it. [Read More]
The cybercriminals behind the Maze ransomware claim they hacked LG and obtained highly sensitive information. [Read More]
Morocco says it is investigating a journalist for receiving "foreign funding" for "intelligence services" days after rights group Amnesty alleged the government had used Israeli spyware to bug his phone. [Read More]
Akamai has mitigated a second record-setting DDoS attack since the beginning of June, one that peaked at 809 MPPS. [Read More]
Twitter has suspended the account of Distributed Denial of Secrets after it posted links to information on 200 law enforcement organizations. [Read More]
Twitter has informed business users that their billing information may have been exposed through their web browser’s cache. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Devon Kerr's picture
Organizations should plan beyond initial compromise and invest in technologies, personnel and methods that foster a more complete understanding.
Marc Solomon's picture
With a platform that can act as a virtual cybersecurity situation room, teams and team members can share the same pool of threat data and evidence to conduct investigations collaboratively.
Stan Engelbrecht's picture
Security teams should always be on the lookout for ways to become more proactive by predicting and anticipating their adversaries’ next moves
Marc Solomon's picture
Like the teams that progress through to the NCAA National Championship, you’ve now pared down “the threat landscape” to “your threat landscape” and set yourself up for success.
Gunter Ollmann's picture
As malware writers harness AI for cybercrime, the security industry must push forward with a new generation of dissection and detonation technologies to prepare for this coming wave.
Josh Lefkowitz's picture
It can be difficult for teams to determine how to obtain and incorporate data from encrypted chat service platforms into their collection strategies in a meaningful way.
Torsten George's picture
The anatomy of a hack has been glorified and led to the common belief that data breaches typically exploit zero-day vulnerabilities and require a tremendous amount of code sophistication.
Marc Solomon's picture
You need a way to ensure your threat hunting efforts are focused on high-risk threats and that the team is operating efficiently since time is the enemy.
Marc Solomon's picture
As a security professional, wouldn’t it be great to be able to focus on one thing at a time and know you’re focused on the right things to protect the organization?
Marc Solomon's picture
Most organizations have more intelligence than they know what to do with. What’s lacking is a way to aggregate all this data in one manageable location where it can be translated into a uniform format for analysis and action.