By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Information security incident response News
December 09, 2016
Georgia Tech received a contract to research the science of cyber attribution, but experts disagree on whether it is possible to succeed in this endeavor.
September 07, 2016
While President Obama said we can still defuse a potential cyber arms race, some experts believe we are already in such competition or already past it and in open conflict.
July 08, 2016
In a move to support the development of global cybersecurity norms, Microsoft calls for improved cyber attribution to identify cyberattack perpetrators.
June 24, 2016
Experts said human intelligence was the key to the cyber attribution effort for the Democratic National Committee attack, which confirmed Russian agents were to blame.
Information security incident response Get Started
Bring yourself up to speed with our introductory content
Cyber attribution is the process of tracking, identifying and laying blame on the perpetrator of a cyberattack or other hacking exploit. Continue Reading
Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident, or security incident. Continue Reading
A DROWN attack can occur through more than a third of all HTTPS connections. Expert Michael Cobb explains how DROWN enables man-in-the-middle attacks and mitigation steps to take. Continue Reading
Evaluate Information security incident response Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
When hackers kick the door down and are ransacking your enterprise, the security team needs to be equipped with the right incident response toolkit to mount a fast, effective reaction. The right forensic data needs to be stored, the right ... Continue Reading
Incident response tools are an essential element of any enterprise's incident response management system. This publication helps security pros identify the best IR tools for their enterprise. Continue Reading
Discoveries of vulnerabilities in antivirus tools, such as Symantec Antivirus, have put their abilities into question. Expert Nick Lewis explains how it affects enterprises. Continue Reading
Manage Information security incident response
Learn to apply best practices and optimize your operations.
Meeting top security goals is only the first step. Get up to speed on how to avoid common pitfalls in the use of threat intelligence and analytics. Continue Reading
Ransomware attacks on healthcare data are on the rise. Expert Ernie Hayden explains why healthcare organizations are a target and the effects of these attacks. Continue Reading
Stronger network security could be the key to preventing a ransomware infection. Expert Kevin Beaver has five ways organizations can improve their networks to stop this threat. Continue Reading
Problem Solve Information security incident response Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When removing malware for client devices, how can security teams decide if the infection is truly gone? Expert Nick Lewis explains the cleanup process and the best practices. Continue Reading
Researchers have discovered a new technique for de-anonymizing software that could help infosec teams attribute malware attacks. Expert Nick Lewis explains how it works. Continue Reading
Video: Bruce Schneier, CTO of Resilient Systems, talks to SearchSecurity about the importance of strong incident response management in reaction to the 'year of the data breach.' Continue Reading