Security teams had best bring their A-game to compete against ever-more sophisticated threat actors as new cyber risks emerge and evolve in 2018.
Recent research has failed to pin down exactly how the current crypto-mining craze is trending, but companies can derive many key enterprise security lessons from the latest headline-grabbing threat.
By optimizing intelligence at the strategic, operational and tactical levels, organizations can promote collaboration and bolster the incident response capabilities of their security teams.
Like any good sports franchise, a successful security operations center must be built to win now and to meet the ever-evolving challenges of the future.
Most organizations around the world lack a consistent incident response plan and thus are unprepared to manage the repercussions of a cyberattack, according to a recent Ponemon report.
A data breach simulation is a great way to test your team's crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.
By implementing orchestration and automation (O&A), security leaders can deliver the real-time threat intelligence their understaffed analyst teams need to punch above their weight.
Many organizations still rely on reactive blocking and tackling strategies, but proactive threat hunting is the only way to detect the type of chatter that is indicative of an impending attack.
New Incident Response Study Reveals More Than Half of Attackers Use Social Engineering to Target Organizations
A new study on incident response revealed that more than half of external attackers use social engineering in targeted campaigns against organizations in various sectors.
The SEC released updated guidance regarding cybersecurity disclosure for public companies, emphasizing the responsibility of executives to report material risks and incidents.