Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A data breach has impacted Maine State Police’s information sharing database for federal, state and local law enforcement officials, the agency confirmed late Friday. [Read More]
Many companies view the SOC as a key part of their security strategy, but SOC staff complain about high stress and the lack of proper tools. [Read More]
Australian beverage company Lion says there is no evidence that hackers have stolen information from its systems, but the hackers claim they have and are threatening to leak it. [Read More]
The cybercriminals behind the Maze ransomware claim they hacked LG and obtained highly sensitive information. [Read More]
Morocco says it is investigating a journalist for receiving "foreign funding" for "intelligence services" days after rights group Amnesty alleged the government had used Israeli spyware to bug his phone. [Read More]
Akamai has mitigated a second record-setting DDoS attack since the beginning of June, one that peaked at 809 MPPS. [Read More]
Twitter has suspended the account of Distributed Denial of Secrets after it posted links to information on 200 law enforcement organizations. [Read More]
Twitter has informed business users that their billing information may have been exposed through their web browser’s cache. [Read More]
Technology services giant Cognizant has informed clients that the Maze ransomware attack it suffered in April 2020 resulted in personally identifiable and financial information being stolen. [Read More]
US broadband and networking semiconductor maker MaxLinear this week revealed that some of its operational systems were infected with Maze ransomware. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
With capabilities to quickly curate and integrate new threat data sources across your operations, you’re prepared for whatever the future brings.
John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.
Jim Ducharme's picture
Heightened anxiety is a normal consequence of drastic change, and it’s natural for the entire organization to be stressed by the shift to a fully remote work environment.
Preston Hogue's picture
The healthcare industry will need advanced security measures to identify and mitigate flaws in new apps carrying the world’s most sensitive, regulated information.
Marc Solomon's picture
The LEAD threat intelligence framework is a perfect example of the symbiosis between technology and people to strengthen security posture.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Gunter Ollmann's picture
While defense scoring lowers the barrier to sharing defensive success insights, it does not yet address the insights gained from learning from others’ failures and the stigma of a breach.
AJ Nash's picture
Elevating from the Cyber threat intelligence (CTI) team concept to an “intelligence team” concept is the next generation of intelligence practice within the private sector.
Marc Solomon's picture
Threat intelligence value comes down to relevance and accessibility, which requires curation into a customized enrichment source, aggregating data filtered by a range of factors.