Disaster recovery (DR) technologies should be considered an integral component of multilayered protection for both your data and your uptime.
Browsing: Threat Intelligence
John Walker comments on common user behavior with respect to mobile devices and suggests that these tools deserve more respect and security awareness.
By taking stock of their human and technological resources, security teams can determine if they are prepared to effectively respond to APTs.
Lucas Zaichkowsky, Enterprise Defence Architect at AccessData, comments on the CHS hack that compromised 4.5 million patients’ data.
When we start mapping our efforts to the attacker’s infiltration steps (known as the cyber kill chain), we can focus our incident response efforts.
Experts in the information security field comment on the Supervalu data breach.
At Black Hat, ForeScout Technologies announced new ControlFabric integrations with Rapid7 Nexpose and ThreatStream.
A group of security experts in the information security industry comment on the recent CyberVor attack.
FireEye, Inc. and Fox-IT have announced Decryptolocker, a new service assisting victims of the Cryptolocker ransomware.
Professor John Walker proposes that we should utilize the element of imagination to think as would a cyber criminal to locate security unknowns.