Incident Response

Phishing Attacks on Your Brand are Unrelenting, AI is the Only Way to Fight Back

When it comes to detecting phishing and social engineering threats, slow response times are detrimental. Automate online brand protection to take…

8 hours ago

The Critical Role of Network Detection and Response in Improving Enterprise Security [Q&A with Vito Rallo of PwC]

Vito Rallo is Director of Cyber Incident and Threat Management at PwC. He and his team provide offensive security and…

3 days ago

First Hour Response: The Only Way to Handle an Event Prior to it Becoming an Incident

By Chris Mills In a recent blog post around Cobalt Strike, Chris Gerritz spoke about how important it was to…

3 weeks ago

3 Steps to Building a Resilient Incident Response Plan

According to the Accenture State of Cybersecurity 2020 report, the average cost of a cyber attack for ‘non-leaders’ stands at…

1 month ago

Now You Know – Q&A about Bricata with CEO John Trauth

Bricata CEO John Trauth discusses how Bricata is helping the world’s largest organizations secure their networks by delivering the most…

1 month ago

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With…

1 month ago

IBM Security: The Critical Solution for a World at Risk

I started in tech working for IBM and what makes the company unique is not its age—over 100 years—but the…

1 month ago

How far does endpoint detection and response (EDR) take you to complete threat intelligence?

Lots of new cyber vendors are starting up all the time. Crunchbase’s list of top cybersecurity startups  is 1,089 businesses…

2 months ago

Incident Response: Pay a Ransom, Go to Jail

Companies that find their files, data or networks locked by a malicious actor demanding an extortion payment now have a…

2 months ago

Managing Enterprise Risk and Prioritizing Cybersecurity Investments

The post Managing Enterprise Risk and Prioritizing Cybersecurity Investments appeared first on Fidelis Cybersecurity.

2 months ago