When a dreaded security incident or breach takes place, you'll face your true testing time. Here's how to discover what happened after a security incident — without losing your cool.
Today's advanced threats require a comprehensive incident response plan to minimize damage and recover normal operations as quickly as possible in the wake of a data breach.
One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.
Even with a patch available for the new Struts vulnerability, threat actors developed new exploits within hours and coordinated security breach attacks.
Attorney-client privilege can be a key asset to an organization's incident response strategy in the event of a security breach.
The latest edition of the IBM X-Force Threat Intelligence Index detailed how companies were affected by data breaches during the "year of the mega breach."
The list of notable 2016 data breaches is long and wacky. Cybercriminals compromised food delivery apps, FBI databases and seemingly everything in between.
IBM Security Intelligence Product expert Mark Ehr offers strategy guidance to help IT security teams effectively detect and respond to threats.
The U.S. State Department is the latest government agency to be targeted by cybercriminals, with a phishing email leading to a breach of the network.
From Health Care to Health Crisis: A Consumer’s Perspective on Health System Breaches and Stolen Customer Data
After being the victim of a health system breach that stole my customer data, I realized organizations need to invest in a threat protection system.