Information Security Incident Response Detection and Analysis
- December 09, 2016
Georgia Tech received a contract to research the science of cyber attribution, but experts disagree on whether it is possible to succeed in this endeavor.
- September 07, 2016
While President Obama said we can still defuse a potential cyber arms race, some experts believe we are already in such competition or already past it and in open conflict.
- July 08, 2016
In a move to support the development of global cybersecurity norms, Microsoft calls for improved cyber attribution to identify cyberattack perpetrators.
- June 24, 2016
Experts said human intelligence was the key to the cyber attribution effort for the Democratic National Committee attack, which confirmed Russian agents were to blame.
- June 17, 2016
The hack of the Democratic National Committee has called into question methods for cyber attribution after the alleged attacker comes forward.
- February 18, 2016
Data breaches are becoming more and more common -- as are class-action lawsuits from affected customers and employees. So, what are the costs of data breach lawsuits?
- November 23, 2015
Adobe CSO Brad Arkin spoke at the recent Privacy. Security. Risk. 2015 event about his experiences dealing with the company's massive data breach two years ago.
- July 29, 2015
Video: Security operations centers are critical to continuous network monitoring and detecting data breaches. Eric Cole discusses SOCs and the role security automation plays in them.
- February 13, 2015
News roundup: While data sharing can boost intelligence and improve security, recent events show the benefits don't always outweigh the pitfalls. Plus: Chip-enabled POS systems coming quickly; MongoDB databases exposed; sophisticated phishing scams.
- November 14, 2014
News roundup: A recent study revealed IT pros' confidence in implementing basic security measures is high, contradicting data that enterprises consistently fail to thwart basic attacks. Plus: BrowserStack hack lessons; responsible phishing reporting...
- June 24, 2014
At its annual security confab, the research giant said enterprises buy too much threat prevention and not enough detection and response technology.
- April 11, 2014
FireEye and Palo Alto Networks take issue with the new NSS Labs report on breach-detection systems, calling the review process into question.
- March 25, 2014
Innovative threat detection products like FireEye and Damballa aren't being deployed inline and that lack of trust poses incident response challenges.
- March 06, 2014
Speakers at RSA Conference 2014 said information security incident response teams must identify and prep key participants well before incidents occur.
- February 13, 2014
Ponemon data shows security professionals are often stretched too thin to conduct thorough enterprise information security incident response efforts.