incident response

IBM Watson to power cognitive security operations centers
At RSA Conference 2017, IBM Security announced Watson for Cyber Security, the industry’s first augmented intelligence technology designed to power cognitive security …

Six best practices for managing cyber alerts
Security professionals know that the number of cyber alerts is growing at a frantic pace. Even a mid-sized company can face tens of thousands of alerts every month. As the …

The decline of cyber resilience: Organizations unprepared to face attacks
Only 32 percent of IT and security professionals say their organisation has a high level of cyber resilience – down slightly from 35 percent in 2015, according to a global …

How to prepare your company for cybersecurity threats
When the FBI announced the arrest of a Russian hacker in October, it was notable – but maybe not for the reason you’d expect. Yevgeniy N., who was picked up in Prague, is …

Incident response survival guide
All organizations are impacted by a security breach at some point. As the joke goes in the security industry, businesses fall into two categories: those that have been …

Incident response challenge: How to get out of Firefighter Mode
Organizations tend to have the mindset that their IT and security teams should play the role of First Responders on the scene of a security incident. They expect their IT and …

Obama defines how the US government will respond to cyber incidents
US president Barack Obama approved on Tuesday the Presidential Policy Directive on United States Cyber Incident Coordination (PPD-41). What’s the PPD-41 all about? …

War Room app for enterprise incident response and collaboration
Today at RSA Conference, Rook Security introduced War Room, an enterprise app that provides real-time unified incident and crisis management collaboration in the cloud. …
Featured news
Resources
Don't miss
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)
- AI security governance converts disorder into deliberate innovation
- Open-source flow monitoring with SENSOR: Benefits and trade-offs