Incident Response
Getting Ahead of Cybersecurity Materiality Mayhem
Cybersecurity leaders must differentiate between strategic (material) and tactical threats in a cross-functional manner and determine 'materiality.' ...
Security Boulevard
Does Your Security Team Need a Dedicated Collaboration Tool?
Richard Pidgeon | | chatbots, collaboration, communication, Incident Response, IT Security, out-of-band
Investing in an IT- and/or security-specific collaboration platform ensures your team has tools that align with their IT and security requirements ...
Security Boulevard
2023 Sees Record Data Compromises Amidst Changing Tactics
Cybercriminals are shifting their focus toward targeted identity fraud and scams resulting in fewer overall victims ...
Security Boulevard
How to Enrich Data for Fraud Reduction, Risk Management and Mitigation in BFSI
BFSI organizations are increasingly relying on data products to enrich data and enhance fraud reduction and risk management strategies ...
Security Boulevard
Two Practical Examples of Modern Cloud SecOps
These two examples of of core principles should help any SecOps team improve their cloud security operations. ...
Security Boulevard
The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part Two
Navroop Mitter | | cyberattack, Cybersecurity, Incident Response, out-of-band communications, Threat, Threat Intelligence
It's important to establish and test out-of-band communication before you experience an attack, or 'left-of-bang.' ...
Security Boulevard
The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part One
Navroop Mitter | | cyberattack, Cybersecurity, Incident Response, out-of-band communications, Threat, Threat Intelligence
Out-of-band communication is a necessity to prohibit outsiders from observing internal incident response activities or taunting response teams ...
Security Boulevard
Russian Hackers Orchestrate Ukrainian Telecom Giant Attack
Wajahat Raja | | Cyber threat landscape, cyberattack, cybersecurity breach, Cybersecurity News, Data breaches, Illia Vitiuk, Incident Response, Infiltration Timeline, Kyivstar, Malware Intrusion, Russian hackers, Sandworm, Solntsepek, State-controlled Hacker Group, Telecom Industry Vulnerabilities, Telecom Networks, Telecommunications Security, Ukrainian Telecom Giant Attack
In a recent revelation by Ukraine’s top cyber official, Illia Vitiuk, it has been unveiled that the cyberattack on Kyivstar, Ukraine’s largest telecom operator, had its roots embedded months before the notorious ...
SEC Cyber Incident Reporting Rules Pressure IT Security Leaders
As the SEC gets tough on businesses' cybersecurity posture, IT security leaders will need to beef up incident response plans ...
Security Boulevard
How to Build a Phishing Playbook Part 2: Wireframing
Kartik Subramanian, Engineering | | Cybersecurity Containment Strategies, Cybersecurity Recovery Actions, Cybersecurity Workflow Design, Email Authentication Techniques, Incident Response, Incident Response Stages, Phishing Investigation Techniques, Phishing Playbook Automation, Phishing Triage and Enrichment, Smart SOAR Integration, SOAR, Wireframing Security Processes
Welcome back to our series on automating phishing investigation and response with playbooks in Smart SOAR. This is a four-part series covering preparation, wireframing, development, and testing. In this part, we’ll be ...