Incident Response July 19, 2019 How to Create an Effective Incident Response Plan 4 min read - Build an incident response plan, practice implementing it, and orchestrate and automate to make operations more efficient.
July 15, 2019 Threat Actors Could Abuse iOS URL Scheme to Undermine User Privacy 2 min read - Threat actors could abuse the iOS URL Scheme to undermine user privacy and stage other attacks with respect to certain vendors' apps.
Data Protection July 3, 2019 Finding New Approaches to Web Application Security 3 min read - Because so much is centered on web services and similar technology nowadays, web application security must be a high priority within any security system.
Artificial Intelligence June 26, 2019 Can Cybersecurity AI Prevent Attacks From the Inside Out? 3 min read - By building cybersecurity AI models around the life cycle of the user, organizations can start to outline patterns for normal behavior and detect patterns that seem abnormal.
Artificial Intelligence June 24, 2019 How Artificial Intelligence (AI) Helps Bridge the Cybersecurity Skills Gap 2 min read - Artificial intelligence can help organizations bridge the security skills gap and effectively investigate all potentially malicious behaviors in their environment in a thorough and repeatable way.
Intelligence & Analytics June 20, 2019 Pulling Strategic Value Out of Your Cyberthreat Intelligence Practices 5 min read - Having access to or generating cyber threat intelligence doesn't automatically translate into better security outcomes. So how can organizations squeeze the most out of their intelligence practices?
June 17, 2019 Threat Actors Use Targeted Attack Tools to Distribute Cryptocurrency Miners, Ransomware 2 min read - Threat actors are using targeted attack tools to distribute typical malware, such as cryptocurrency miners and ransomware.
Artificial Intelligence June 7, 2019 Have Your Virtual Assistant Call My Bot and We’ll Do Lunch: A Step Toward the Cognitive Enterprise 4 min read - In the near future, we're going to see the role of office power broker shift from an administrative assistant to a virtual assistant. How does the CISO's role change in this cognitive enterprise?
Risk Management June 4, 2019 Gaming the System: How MMOs Can Level Up Your Cybersecurity Best Practices 4 min read - MMOs offer key lessons to help enterprises improve their cybersecurity best practices. Here's a look at the top three.
June 3, 2019 New HiddenWasp Linux Malware Focused Solely on Achieving Targeted Remote Control < 1 min read - A new threat called HiddenWasp is different from other Linux malware in that it's focused solely on achieving targeted remote control of infected hosts.