Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Experts have identified an unprotected Elasticsearch server that contained terabytes of data pertaining to users of Microsoft’s Bing mobile application. [Read More]
Kognos has emerged from stealth mode with an autonomous XDR platform that uses AI to help organizations efficiently detect, investigate and respond to attacks. [Read More]
Mozilla is discontinuing the Send feature in Firefox due to the fact that it has been abused to deliver malware and phishing attacks. [Read More]
U.S. FERC and NERC release a report outlining cyber incident response and recovery best practices for electric utilities. [Read More]
U.S. Department of Treasury announces sanctions against Iran-based threat actor APT39, associated individuals, and a front company named Rana. [Read More]
Researchers at Temple University have been tracking ransomware attacks on critical infrastructure and they are providing the data for free. [Read More]
Data center and colocation services provider Equinix this week revealed that it was the victim of a ransomware attack. [Read More]
Cybersecurity agencies in Australia, Canada, New Zealand, the United Kingdom, and the United States have published a joint advisory on detecting malicious activity and incident response. [Read More]
The American Payroll Association (APA) says user information was stolen after attackers managed to inject a skimmer on its website. [Read More]
New Zealand's spy agency has been brought in to help fight back against cyberattacks that crippled the country's stock exchange for a fourth straight day on Friday. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
While it may be a trendy term, in cybersecurity, intelligence pivoting is pivotal to detection and response.
Joshua Goldfarb's picture
A healthy dose of self-doubt can go a long way towards keeping us on our toes and continually improving the security posture of our respective organizations.
Idan Aharoni's picture
The term "Threat Intelligence" encompasses an ever-growing set of offerings that, on an operational standpoint, have different use cases.
Marc Solomon's picture
Security tools need to integrate with a centralized repository of relevant, prioritized threat intelligence, and with all your security controls.
Rafal Los's picture
More security tools can increase your cost, increase overall complexity, and eventually decrease your organization's ability to be effective.
AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
Marc Solomon's picture
With capabilities to quickly curate and integrate new threat data sources across your operations, you’re prepared for whatever the future brings.
John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.