Incident Response

Incident Response

fa.jpg

Learn and Avoid

/
i.e., Negative Potentiality... Well scrivened, crafted, reasoned, and timely blog post by Andrew Cook (writing at the Delta Risk - A Chertoff Company - blog). In which, impeccable advice is offered, on ...
Understanding the Real Cost of a Cyber-Attack and Building a Cyber-Resilient Business

Understanding the Real Cost of a Cyber-Attack and Building a Cyber-Resilient Business

/
Cyber-attacks are like parasites: they are not always visible, not always felt, but with plenty of potential to affect your operational efficiencies, service level agreements, and computing resources. All of those impacts ...

Avoid These Common Incident Response Assumptions and Planning Mistakes

/
Last week, I took part in one of SecureWorld Seattle’s panels, “Manage the Damage – The Current Threat Landscape.” This panel focused on the topic of developing, fine-tuning, and practicing ... The ...

Data Loss Horror Stories You Should Avoid this Halloween

/
Think an overcrowded inbox is scary? An empty inbox is even scarier. Imagine how your organization would be affected if you suddenly lost access to every one of your emails. Consider all ...

Protecting USB Sticks

/
It is in my opinion a controversial discussion: Do you allow the use of USB sticks in a corporate environment and if yes, how? Obviously, today there are a lot of other ...

A Nightmare on Your Street: Three Minutes Until the Apocalypse

/
Halloween is upon us. Which gives me the perfect excuse to tell this Halloween horror story: An adversary has targeted your organization and commenced a campaign to breach your defenses, establish a ...

6 Essential Steps for Creating an Actionable Incident Response Plan

/
A few weeks ago, I spoke at the ASIS 63rd Annual International Conference about creating an actionable cyber security incident response plan that is tested and proven. Considering ASIS is more ...
No Mr. Equifax CEO, You Don’t Get to Blame One “IT Guy” for Your Breach

No Mr. Equifax CEO, You Don’t Get to Blame One “IT Guy” for Your Breach

/
Don’t blame former Equifax CEO Richard Smith that 145.5 million U.S. consumers had their most sensitive credit information stolen under his watch, or that just over 15 million in the U.K. suffered ...
Women in Information Security: Tarah Wheeler

Women in Information Security: Tarah Wheeler

/
In my last interview, I got to speak with Keren Elazari. Not only did she start BSides TLV but also contributed to a book about women in technology. The book is Women ...

What you can learn from Equifax’s leak

/
When it comes to security, it’s better to be safe than sorry. But as the Equifax leak case has taught us, once a security breach does happen, it’s best not to be ...
Loading...