Home Tags Response

Tag: Response

Incident response research from Big Blue offers surprising results, as hacks get more serious but defenders improve their tools and training.
IBM's Wendi Whitmore explains.
At IBM, the IBM Cloud Container Service is updated an average of 40 times per day.

This may seem like a shockingly high number of updates, but there is good reason.

Built on top of microservices and deployed globally on the IBM Cloud, we want to pro...
To intervene with optimum efficiency, response team needs to zero in on the most potentially dangerous endpoint anomalies first. And according to Harish Agastya, VP of Enterprise Solutions at Bitdefender, machine learning-assisted EDR can help you do ...
A "long-planned" change happens to coincide with a new wave of state censorship in Russia.
"LAGFIX" fast-forwards through "hidden" frames for near-instant response times.
Using KPIs can have a positive impact on the tactical and strategic functions of a security operations program.
Allan Liska, Senior Security Architect at Recorded Future, believes everyone in the infosec team - including vulnerability management and threat response staff - can take greater advantage of available threat intelligence to more effectively and effici...
Former officials at DHS, DOJ, and DOD diverge on issues of attribution and defining what constitutes an act of cyber war.
"The extensive disruption caused by WannaCry laid bare serious vulnerabilities in the cyber security and response plans of the NHS," warn MPs.
Telling people what scientists think makes conservative states look liberal.
Crypto expert panel tackles the big stories of the year RSA 2018  Speaking at the 2018 RSA conference, a board of some of the most respected names in security spoke on Tuesday and were scathing about Facebook – and the industry's response to the Spectr...
Titan IC Systems, Strategic LookingGlass Partner delivers innovative technology for Deep Packet Processing Module in IRD-100Reston, VA – April 17, 2018 – LookingGlasstrade; Cyber Solutions, a leader in threat intelligence-driven security, ...