How PR Teams Can Prepare for Data Breach Risks With Incident Response Planning

Like your incident response team, the PR team needs to understand data breach risks, prepare with communication templates, processes, and tooling and be part of your incident response plan.

The post How PR Teams Can Prepare for Data Breach Risks With Incident Response Planning appeared first on Security Intelligence.

Continue reading How PR Teams Can Prepare for Data Breach Risks With Incident Response Planning

Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security

Some of the latest website security threats originate from thriving dark web marketplaces for TLS/SSL certificates, which often come packaged with other cybercrime services.

The post Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security appeared first on Security Intelligence.

Continue reading Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security

Missed DNS Flag Day? It’s Not Too Late to Upgrade Your Domain Security

Whether or not you plan on using DNS cookies or DNSSEC, foreseeing an upgrade plan for your software to the latest version made available as part of DNS Flag Day is highly advised.

The post Missed DNS Flag Day? It’s Not Too Late to Upgrade Your Domain Security appeared first on Security Intelligence.

Continue reading Missed DNS Flag Day? It’s Not Too Late to Upgrade Your Domain Security

Breaking Down the Incident Notification Requirements in the EU’s NIS Directive

Similar to the GDPR, you can approach the NIS Directive as a roadblock or a nuisance, or you can consider it an excellent opportunity to improve your security posture.

The post Breaking Down the Incident Notification Requirements in the EU’s NIS Directive appeared first on Security Intelligence.

Continue reading Breaking Down the Incident Notification Requirements in the EU’s NIS Directive

Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough

Your CSIRT protects your organizational network, but who secures your products? It may be time you started a PSIRT at your company.

The post Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough appeared first on Security Intelligence.

Continue reading Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough

Why You Need a BGP Hijack Response Plan

BGP hijack attacks are increasing in popularity, but are still largely unaddressed in many organizational incident response plans.

The post Why You Need a BGP Hijack Response Plan appeared first on Security Intelligence.

Continue reading Why You Need a BGP Hijack Response Plan

How to Use Passive DNS to Inform Your Incident Response

Passive DNS replication can be an essential source of data to contextualize your threat intelligence and inform your incident response plan.

The post How to Use Passive DNS to Inform Your Incident Response appeared first on Security Intelligence.

Continue reading How to Use Passive DNS to Inform Your Incident Response

Don’t Dwell On It: How to Detect a Breach on Your Network More Efficiently

Dwell times for data compromises are still shockingly high. Understand how to detect a breach in your network to improve response and mitigation time.

The post Don’t Dwell On It: How to Detect a Breach on Your Network More Efficiently appeared first on Security Intelligence.

Continue reading Don’t Dwell On It: How to Detect a Breach on Your Network More Efficiently

What Metrics Do You Need to Measure the Success of Your SOC?

Your SOC collects mounds of data every day, but not all of it will contribute to a useful, relevant analysis of its performance. What metrics do you need to measure the success of your SOC?

The post What Metrics Do You Need to Measure the Success of Your SOC? appeared first on Security Intelligence.

Continue reading What Metrics Do You Need to Measure the Success of Your SOC?

How to Leverage Log Services to Analyze C&C Traffic

Security teams can generate valuable insights about ongoing attacks by using log services and threat intelligence to analyze C&C traffic.

The post How to Leverage Log Services to Analyze C&C Traffic appeared first on Security Intelligence.

Continue reading How to Leverage Log Services to Analyze C&C Traffic