The Telltale Signs of a Business Email Compromise (and How to Avoid an Attack)

| | Data Security
The post The Telltale Signs of a Business Email Compromise (and How to Avoid an Attack) appeared first on Delta Risk ... Read More
Why Most Real-Time Defensive Solutions Are Poor Threat Hunting Solutions

Why Most Real-Time Defensive Solutions Are Poor Threat Hunting Solutions

The post Why Most Real-Time Defensive Solutions Are Poor Threat Hunting Solutions appeared first on Delta Risk ... Read More

Predicting the Future of Ransomware and Crypto Mining in the Cloud

The post Predicting the Future of Ransomware and Crypto Mining in the Cloud appeared first on Delta Risk ... Read More

Incident Response Strategy: Determining Where to Invest

The post Incident Response Strategy: Determining Where to Invest appeared first on Delta Risk ... Read More

Avoid These Common Incident Response Assumptions and Planning Mistakes

Last week, I took part in one of SecureWorld Seattle’s panels, “Manage the Damage – The Current Threat Landscape.” This panel focused on the topic of developing, fine-tuning, and practicing ... The post Avoid These Common Incident Response Assumptions and Planning Mistakes appeared first on Delta Risk ... Read More

Incident Response Best Practices: What You Can Expect During the First Call

Imagine this scenario: you’ve just discovered your network has been breached. You need to get a handle on the situation quickly but you’re still trying to figure out what happened. ... The post Incident Response Best Practices: What You Can Expect During the First Call appeared first on Delta Risk ... Read More