Cybersecurity And The IoT: From Incident Response To Continuous Response

There’s no doubt the Internet of Things (IoT) will eventually take over the digital universe. By 2020, IDC predicts there will be more than 210 billion connected devices available, with at least[…]

Read More

The Health Care Industry: Cybercriminals Have a New Favorite Target

Whether you work in cybersecurity at a hospital or a company that provides health insurance, your data has either been targeted by hackers or will be. Cybercriminals have been attacking the health[…]

Read More

Doxware: The Latest in New Ransomware Threat

Cybercriminals have become increasingly sophisticated in their attacks. A few years ago, the crooks’ primary goal was to steal massive amounts of data that they could resell; credit card numbers,[…]

Read More

Top Quotes from "Mr. Robot" that SOC Managers will Understand

Below are some security best practices as told by Mr. Robot – the popular TV series about hacking, currently wrapping up its second season. By taking such simple steps, security professionals can[…]

Read More

5 Tips on Hiring and Retaining the Right Cybersecurity Talent

If you are a cybersecurity professional, you already know that there is a serious shortage of qualified talent. According to the U.S. Bureau of Labor Statistics, there were almost 210,000 unfilled[…]

Read More

Use Email for Messages, Not for Incident Management

As a CISO, you know how difficult it is to recruit the best staff. Once you bring them on board, you must also work to retain them — after all, their skills are in short supply, and your[…]

Read More

Top 10 Best Practices for Cyberbreach Post-Crisis Communication

 

According to an article appearing in AT&T Cybersecurity Insights, 62 percent of all organizations surveyed admitted that they had suffered a breach in 2015. Furthermore, although 42 percent[…]

Read More

6 Questions You Must Ask for a Successful Incident Response

For most organizations, suffering a cyberattack is not a matter of “if” – it is a matter of “when.” Today’s hackers have more technology and are more persistent than ever before. Lately they seem[…]

Read More

Data Breach Handling Best Practices

Introduction

A data breach could happen to anyone. Data managed by your company is valuable to someone, no matter what the data is. Everything has a price tag on the dark web. It is especially[…]

Read More

Proactive Hunting: Hunt With a Plan, Structure and Automation

To improve the security posture and to detect advanced threats organizations needs to embrace proactive hunting on their networks, as part of their regular security activities.

This article is not[…]

Read More