Incident Response News, Articles and Updates
As the level of sophistication of digital attacks grows rapidly, targeted organizations must devise a strategic, military-like response.
The only way to gain the upper hand on today's advanced adversaries is by being proactive -- even aggressive, a tactic that can take many forms, says Joel Yonts, CISO of an automotive supply company.
We've recently been witnessing tremendous change in perspective when it comes to IT security and the shroud of embarrassment associated with breaches has been lifting.
"Cyber Atlantic 2011" aimed to clarify how the two nations can best communicate about cyber incidents that occur on government systems or critical infrastructure.
EMC has acquired NetWitness, a fast-growing network monitoring and analysis firm that caters to a slew of Fortune 100 and government customers.
Thousands of cybersecurity experts from across the country and abroad will converge this week for Cyber Storm III, a three-day-long exercise designed to evaluate America's ability to respond to a cyberattack. The exercise will offer the first test of the recently devised National Cyber Incident Response Plan by simulating a large-scale assault on the nation's critical infrastructure, according to a news release. Participants are expected to include representatives from federal agencies, 11 states, 60 private companies and 12 countries. Cyber Storm exercises previously were held in 2006 and 2008. — DK
SC Magazine Articles
- Three zero-days found in iOS, Apple suggests users update their iPhone
- MedSec goes its own way with medical device flaw
- Voter databases in two states breached by foreign hackers, FBI
- Juniper confirms leaked "NSA exploits" affect its firewalls, no patch released yet
- Ransomware: The evolution of cybercrime, a roundtable
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!
- China allows foreign tech firms to participate in creating cybersecurity standards
- Fantom and FairWare ransomware discovered
- Six senators urge Obama to prioritize cybercrime at G20 summit
- Creating a buzz: USBee software causes air-gapped computers to leak data via USB connections
- Privacy advocates upset over FAA drone regulations, citizen takes action