Want to stay well-protected against emerging cybersecurity threats? Keep a close eye on the latest headlines, says BlackCloak's Chris Pierson, who recommends organizations continually refine - and practice - their incident response plan based on the latest real-life attack scenarios.
Troels Oerting, a veteran CISO who most recently served the World Economic Forum, has a storied career. He's been there, done that and mitigated the risk. In this exclusive conversation, he shares his opinions on today's threats, emerging technologies and challenges for the next generation of security leaders.
A recent study showed that even though 82% of cybersecurity professionals are familiar with the MITRE ATT&CK framework, only 8% said they used it regularly. This led to development of the new MITRE ATT&CK Defender training and certification. Rick Gordon of MITRE Engenuity explains.
Security orchestration, automation and response technologies, or SOAR, give organizations the ability to manage an increasing number of alerts. But security experts say there's no worry that SOAR will replace people. In fact, SOAR could help with staff retention.
He is known for his regular reports for Reuters, as well as for his books, including the latest: "Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World." Joseph Menn opens up on the biggest stories of the year and the lessons that must be learned.
The past year has been a milestone one for RSA and for RSA Conference alike. In this exclusive interview, RSA Group CEO Rohit Ghai discusses the changes, the state of secure identity and the role XDR will play in shaping cybersecurity's future.
Diving into the Colonial Pipeline ransomware attack - culprits, impact, recovery, and the increasing political firestorm it’s triggered - is the focus of the latest edition of the ISMG Security Report. Security leaders weigh in on the attack's significance and potential long-term ramifications.
Investigations are a key part of the analyst workflow. Analysts must be able to answer important questions such as “Was this a successful attack? Is it spreading?”, usually through creating an incident timeline. This step often requires an analyst to manually collect and correlate evidence across disparate tools,...
Security breaches are inevitable in today’s environment of nation-state attacks and organized crime. When you are breached, minimizing financial and reputational damage depends on detecting, investigating, and remediating attacks fast.
Read this solution brief to understand how you can transform your security...
As former CISO of Pacific Gas & Electric, Bernie Cowens knows plenty about cyber securing the nation's critical infrastructure. He shares his informed opinion on the Colonial Pipeline ransomware attack and what public and private sector entities must do to shore up key defenses.
Colonial Pipeline Co. announced Wednesday that it had restarted its operations following a ransomware attack last Friday. The company says it will take several days to restore all of its supply chain operations.
In April, Cybereason published a blog describing its research into the DarkSide ransomware strain that infected Colonial Pipeline this past week. Sam Curry, CSO of Cybereason, shares insights on DarkSide and the tactics behind the new breed of ransomware attacks.
Standards and regulation can impact digital innovation. We will look at some key processes to consider when building your cybersecurity strategy for the future.
This session will explore the relationship between regulation and business requirements and help you gain strategic advantage. In business, we have to...
Gregory Touhill, the retired Air Force general and former federal CISO under President Obama, minces no words when he describes the Colonial Pipeline ransomware attack as a "global day of reckoning" for critical infrastructure protection.