Tag: Incident Response
Security Is Everybody’s Business
A joint study from Stanford University Professor Jeff Hancock and security firm Tessian revealed that nine in 10 (88%) data breach incidents are caused...
Expert’s Take: Why Organizations Fail to Prepare for Cyberattacks
Failure is not an option. This was NASA’s motto for the Apollo space and moon missions in the last century. It could well be...
Why Every Business Needs a Cybersecurity Incident Response Team
In order to get back on track from the ongoing pandemic, organizations have to take into account a completely altered reality, which is very...
Episode #15: Malware Through the Green Channel
Ransomware has become synonymous with cyberattacks in the last two years and is single-handedly driving conversations and investments in the cybersecurity domain. Organizations that...
“Incident Response professionals are working in a high-paced and stressful environment”
At the beginning of 2021, when the cybersecurity community was reeling from the aftereffects of the SolarWinds supply chain attack, a new ransomware strain...
Cyber Incident and Data Breach Management Workflow
These days, it's not a matter of if, but when an organization experiences some kind of data breach. Incidents are increasing in number and...
How to Ensure Data Management Excellence
In response to high-profile data breaches, staggering fines, and rapidly evolving privacy and data requirements, CIOs and CISOs are facing a critical mandate: to...
“We want to bring together incident response and security teams from...
The security community strives to mitigate zero-day attacks. Timely vulnerability disclosure and incident response/handling is the way to do this. But that depends on...
5 Cybersecurity Approaches All Businesses Should Consider
In Googling the “worst year in history,” you might come across the year 536. It was a year dubbed “the worst year to be...
Report to Your Management with the Definitive ‘Incident Response for Management’...
Security incidents occur. It's not a matter of 'if' but of 'when.' There are security products and procedures that were implemented to optimize the...