WhatIs definition: Incident response plan

Information Security Incident Response-Detection and Analysis

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Disaster recovery report card: Measuring your company's disaster recovery profile

    Disaster recovery planning is challenging because you don't know what you're planning for or how well your disaster recovery plan will hold up in the face of an emergency. Use this report card to measure your disaster recovery plan and identify areas... 

  • Security training highlights need for continuity planning

    Organizations wondering how to respond to simultaneous security incidents might learn a few things from the drills being carried out by the State of Delaware. 

  • Privacy Breach Impact Calculator

    How much would a customer privacy breach impact your business? This calculator by information security and privacy expert Rebecca Herold, CISSP, CISM, provides an example of some of the items an organization should consider when estimating the potent... 

  • Digital doomsday can be avoided with preparation

    The U.S. Cyber Consequences Unit says enterprises must take specific measures to shore up their defenses, otherwise they could be vulnerable to attackers who not only steal data, but also manipulate it. 

  • Infosec pros need to get 'physical'

    Many attack scenarios put cyber and physical assets in equal peril, but security pros say it can be tough getting departments in those arenas to work as one defensive force. 

  • Information security, 'CSI' style

    A consultant to the FBI and Scotland Yard says cybersecurity professionals better be careful when they react to a network intrusion, lest they inadvertently let the crooks escape. 

  • Security Bytes: Shockwave flaw fixed

    In other news, McAfee employee data goes missing and an IT exec gets eight years in prison for data theft. 

  • Nyxem's lessons can't be ignored

    The worm didn't create the chaos that was expected, but security pros say it would be a mistake to dismiss it as a dud and ignore the valuable lessons. 

  • What to do when you've been hacked

    Network hacking attacks are more common that most of us would like to admit. In the second installment of his series on managing secure networks, Michael Gregg looks at six questions you need to ask of your organization if you've been hacked, and sug... 

  • Dirty documents cause messy security situations

    What use are firewalls and intrusion prevention systems if insecure digital documents reveal all of an enterprise's best-kept secrets? That's the question many security experts are asking in the wake of several high-profile incidents in which organiz...