Please turn on your JavaScript for this page to function normally.
complex
Are you ready? A good incident response plan can protect your organization

The rise in cyber threats in the last several years has shown that organizations must continuously stay ahead of adversaries to protect their investments: data, intellectual …

cloud proliferation
Diffy: A triage tool for cloud-centric incident response

The Netflix Security Intelligence and Response Team (SIRT) has released Diffy, an open source triage tool that allows digital forensics and incident response teams to quickly …

ThreatQ Investigations
Bring order to the chaos of incident response and threat investigations

In this podcast recorded at RSA Conference 2018, Leon Ward, VP of Product Management at ThreatQuotient, talks about bringing order to the chaos of security operations, as well …

locks
Analysis of 560 incidents demonstrates need for cyber resilience

Many entities face the same types of security incidents – some are viewed as handling the incident well, and for some it’s a disruptive and costly lesson. The ones that fare …

Fox IT
Security company Fox-IT reveals, details MitM attack they suffered in September

Dutch IT security consultancy/service provider Fox-IT has revealed on Thursday that it has suffered a security breach, which resulted in some files and emails sent by the …

bulb
Enterprise security incident response trends to watch in 2018

Resolve Systems shared the top trends to watch in 2018 relating to incident response and automation. The list of predictions are founded on the company’s insight into the …

Degree
Four ways colleges can strengthen their cybersecurity programs

If breaches can’t be entirely blocked, what can IT professionals in higher education do to prevent these kinds of disaster scenarios? The GovEd team at Logicalis US says …

architecture
Automating the hunt for cyber attackers

In this podcast recorded at Black Hat USA 2017, Mike Banic, Vice President, Marketing, and Chris Morales, Head of Security Analytics at Vectra Networks, talk about the use of …

icosahedral
How to select a suitable incident response program for your organization

All organizations, regardless of how well they think their walls are fortified, will at some point fall victim to an attack. How they respond to the attack could mean the …

NTT Security
Win a security gap assessment from NTT Security at Black Hat

This year at Black Hat 2017, NTT Security is focusing on incident response readiness: one lucky show participant will win a thorough security gap assessment from the NTT …

firefighters
Companies unprepared to measure incident response

Companies struggle to keep up with and respond to cyberattacks due to lack of resources, according to Demisto. For example, more than 40 percent of respondents said their …

Book
Review: Advanced Persistent Security

About the authors Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals. Araceli …

Don't miss

Cybersecurity news