Cloud Security Challenges in 2020

Cloud computing has given organizations the ability to harness the power of advanced infrastructure without incurring the upfront costs traditionally required for on-premises networks. Provisioning IT resources requires little knowledge of the underlyi… Continue reading Cloud Security Challenges in 2020

Chernobyl and its Cyber Lessons, Part 2: Incident Response

What can be learned from the incident response of the Chernobyl nuclear disaster in 1986? HBO’s recent “Chernobyl” series, which retold the story of the nuclear accident that threatened much of Europe in 1986, made for compelling viewing. … Continue reading Chernobyl and its Cyber Lessons, Part 2: Incident Response

DEF CON 27, Voting Village – Rahul Patel’s ‘Incident Lifecycle: Incident Response & Management Planning’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn.
Permalink
The post DEF CON 27, Voting Village – Rahul Patel’s &#821… Continue reading DEF CON 27, Voting Village – Rahul Patel’s ‘Incident Lifecycle: Incident Response & Management Planning’

[SANS ISC] Abusing Web Filters Misconfiguration for Reconnaissance

I published the following diary on isc.sans.edu: “Abusing Web Filters Misconfiguration for Reconnaissance“: Yesterday, an interesting incident was detected while working at a customer SOC. They use a “next-generation” firewall that implements a web filter based on categories. This is common in many organizations today: Users’ web traffic is allowed/denied based on an

[The post [SANS ISC] Abusing Web Filters Misconfiguration for Reconnaissance has been first published on /dev/random]

Continue reading [SANS ISC] Abusing Web Filters Misconfiguration for Reconnaissance

Robert M. Lee’s & Jeff Hass’ Little Bobby Comics: ‘The Arrogator’

via the respected information security capabilities of Robert M. Lee & the superb illustration talents of Jeff Hass at Little Bobby Comics.
Permalink
The post Robert M. Lee’s & Jeff Hass’ Little Bobby Comics: ‘The Arrogator&#… Continue reading Robert M. Lee’s & Jeff Hass’ Little Bobby Comics: ‘The Arrogator’

3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network

Reading Time: 3 minutes Network vulnerabilities can be found in the most unlikely places. That’s why companies should adopt zero trust security principles, even if they lack the resources to rebuild the network from scratch.

The post 3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network appeared first on Security Intelligence.

Continue reading 3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network

Gartner Releases 2019 Market Guide for SOAR Solutions

Reading Time: 3 minutes In its new market guide for security orchestration and automation, Gartner predicted, “By year-end 2022, 30% of organizations with a security team larger than five people will leverage SOAR tools.”

The post Gartner Releases 2019 Market Guide for SOAR Solutions appeared first on Security Intelligence.

Continue reading Gartner Releases 2019 Market Guide for SOAR Solutions

How Prepared Is the Financial Services Sector to Respond to a Systemic, Global Cyberattack?

Due to its interconnected nature, the financial services industry needs to prepare to respond to a systemic cyberattack that could impact its overarching infrastructure across borders.

The post How Prepared Is the Financial Services Sector to Respond to a Systemic, Global Cyberattack? appeared first on Security Intelligence.

Continue reading How Prepared Is the Financial Services Sector to Respond to a Systemic, Global Cyberattack?

What’s New in the ‘2019 Cost of a Data Breach Report?’

According to the latest Ponemon Institute study, the average cost of a data breach in 2019 is $3.92 million, up 1.5 percent from last year and $3.5 more than in 2014, the first year of the report.

The post What’s New in the ‘2019 Cost of a Data Breach Report?’ appeared first on Security Intelligence.

Continue reading What’s New in the ‘2019 Cost of a Data Breach Report?’

How to Create an Effective Incident Response Plan

Learn how to respond to cybersecurity breaches in three steps. Build an incident response plan, practice implementing it, and orchestrate and automate to make operations more efficient.

The post How to Create an Effective Incident Response Plan appeared first on Security Intelligence.

Continue reading How to Create an Effective Incident Response Plan