As the level of sophistication of digital attacks grows rapidly, targeted organizations must devise a strategic, military-like response.
Anthony Di Bello of Guidance Software talks about incident response with executive editor, Dan Kaplan, at the SC Magazine offices.
The only way to gain the upper hand on today's advanced adversaries is by being proactive -- even aggressive, a tactic that can take many forms, says Joel Yonts, CISO of an automotive supply company.
We've recently been witnessing tremendous change in perspective when it comes to IT security and the shroud of embarrassment associated with breaches has been lifting.
Trustwave's annual review of its data breach response investigations concluded that franchises are now the prime target for hackers seeking customer data, such as credit card numbers.
"Cyber Atlantic 2011" aimed to clarify how the two nations can best communicate about cyber incidents that occur on government systems or critical infrastructure.
Following a major breach this year, Lockheed Martin CISO Chandra McMahon explains how a quick and calculated reaction helped stave off a disaster. What are the tricks of the trade when it comes to IR?
EMC has acquired NetWitness, a fast-growing network monitoring and analysis firm that caters to a slew of Fortune 100 and government customers.
Thousands of cybersecurity experts from across the country and abroad will converge this week for Cyber Storm III, a three-day-long exercise designed to evaluate America's ability to respond to a cyberattack. The exercise will offer the first test of the recently devised National Cyber Incident Response Plan by simulating a large-scale assault on the nation's critical infrastructure, according to a news release. Participants are expected to include representatives from federal agencies, 11 states, 60 private companies and 12 countries. Cyber Storm exercises previously were held in 2006 and 2008. — DK