Blog Posts Tagged with "Incident Response"
October 07, 2016 Added by:Steve Durbin
Organizations face a daunting array of challenges interconnected with cybersecurity: the insatiable appetite for speed and agility, the growing dependence on complex supply chains, and the rapid emergence of new technologies.
August 18, 2016 Added by:Michael Patterson
Attackers are going to get in and you will be required to perform incident response. The first thing the security team will ask for is the logs. Make sure logs are backed up to a 2nd system or 3rd system and make sure a UDP forwarder is relaying the messages.
December 16, 2015 Added by:Tim Liu
2015 was another fascinating year for cybersecurity. From the OPM to Anthem, Ashley Madison and countless other data breaches, there was no shortage of stories capturing national attention. So what does 2016 have in store?
January 21, 2013 Added by:Thomas Fox
These insights could help you improve your compliance program. And while it doesn’t have quite the same rhyming scheme as Paul Simon’s Mrs. Robinson, here’s to you Stan ‘The Man’ Musial. I hope that you enjoy an inning or two at the great game in the hereafter...
December 08, 2012 Added by:Tripwire Inc
Incident Management is particularly interesting in the light of the recent attacks on Vmware, Symantec and a host of other companies and internet properties. It all boils down to a fairly straight forward question…when an incident occurs, how does your security team respond?
November 13, 2012 Added by:Tripwire Inc
We need to evolve our security capabilities to a point where both the detection and the countermeasures can be automated and automatic. That is the only way we’ll get fast enough to prevent or at least significantly limi) the damage from unexpected attacks. The problem? We don’t tend to trust automation...
November 01, 2012 Added by:Allan Pratt, MBA
Most companies, especially publicly-held companies with complex regulations to follow, have disaster recovery plans. They include instructions for data back-up, storage, and recovery as well as employee training. However, with all this talk about corporate planning, do you have a PERSONAL disaster recovery plan?
October 23, 2012 Added by:Tripwire Inc
For any activity you do, it’s important not just to measure how well the organization did in a stress test situation, but to evaluate where your opportunities for improvement are. In my experience, personas are a great way to communicate a rich context very quickly once they are introduced...
October 21, 2012 Added by:Rafal Los
Organizations that make up the small to medium enterprise market are finding themselves in trouble as they are appearing on a lot of radar screens for attack, yet can't seem to find the resources they need to defend themselves adequately. Lots of challenges present around that point, to start off with...
October 02, 2012 Added by:Don Eijndhoven
So here we have a rather clear-cut case of attacker correlation which, as ever, is done pretty much after the fact by an international firm who investigated the malware. My question is: How do you deal with this as a nation, as it happens?
September 07, 2012 Added by:Drayton Graham
A number of organizations are still using Windows 2000. It is up to the organization to determine the acceptable risk for continued use of Windows 2000-based systems. If Windows 2000 is a necessity at this time within your environment, here are some security techniques you can implement...
September 06, 2012 Added by:David Navetta
Expect an uptick in privacy enforcement by state utility regulators. Utilities across the country are advised to review their information security programs (including vendor management requirements) and breach response processes to address their regulators' concerns...
August 26, 2012 Added by:Rafal Los
The Information Security industry is rife with negativity. Why are we so quick to pile on to others' pain? Isn the security community just more cynical by nature, is it psychological? Are we wired this way? As an industry, our goal is to create more resilient, more secure' and more defensible postures for everyone...
August 19, 2012 Added by:Richard Stiennon
The attackers are going to breach your network to get what they want. The question is: how fast can you discover an intrusion, figure out what the attacker is after, stop the attack, clean up – and prepare for their return? After all, motivated attackers will be back...
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015