A checklist to help healthcare organizations respond to a serious cyberattack

How should organizations in the healthcare sector respond to outage due to a serious cyberattack? The Healthcare and Public Health Sector Coordinating Council’s (HSCC) Cybersecurity Working Group (CWG) has released a tactical checklist aimed at h… Continue reading A checklist to help healthcare organizations respond to a serious cyberattack

Security teams need to become more proactive and risk-driven

83% of companies would suffer business damage during the first 24 hours of an outage and thereafter, which comes as no surprise with recent surges in ransomware and other attacks wreaking havoc across IT infrastructures, a Dimensional Research survey r… Continue reading Security teams need to become more proactive and risk-driven

Siloed security data hamper the ability to achieve collective defense

Cyware revealed a research detailing the challenges affecting modern security operations teams and the negative business impact of siloed security operations. According to the study, conducted by Forrester Consulting, 71% of security leaders report the… Continue reading Siloed security data hamper the ability to achieve collective defense

Combating vulnerability fatigue with automated security validation

Security operations teams have been dealing with “alert fatigue” for far too long. The introduction of log monitoring (e.g., SIEM), firewall, and AV technologies over two decades ago provided valuable tools for IT teams to be alerted to known suspiciou… Continue reading Combating vulnerability fatigue with automated security validation

Automation is not here to close the cybersecurity skills shortage gap, but it can help

In this interview with Help Net Security, Daniel Clayton, VP Global Security Services and Support at Bitdefender, talks about the cybersecurity skills shortage gap and the role of automation in improving the work of cybersecurity professionals. It is c… Continue reading Automation is not here to close the cybersecurity skills shortage gap, but it can help

Phishing attempts: Employees can be the first line of defense

33% of emails employees report as phishing attempts are either malicious or highly suspect, according to new research. The finding comes from an analysis of emails reported by employees from organizations across the globe during the first half of 2021,… Continue reading Phishing attempts: Employees can be the first line of defense

How enterprises use security operations to modernize their business

CyberRes published a report which provides insights into how enterprises are utilizing security operations to modernize their business, secure the digital value chain and systematically address modern threats to achieve greater enterprise resiliency. O… Continue reading How enterprises use security operations to modernize their business

How enterprises use security operations to modernize their business

CyberRes published a report which provides insights into how enterprises are utilizing security operations to modernize their business, secure the digital value chain and systematically address modern threats to achieve greater enterprise resiliency. O… Continue reading How enterprises use security operations to modernize their business

Anton and The Great XDR Debate, Part 1

I know you may hate me for this, but I‘ve been finally tempted into the Great XDR Debate.
Here, if you want TL;DR, my position on XDR today is “wait and see” (boring, huh?). Unlike some of my esteemed former colleagues, I don’t really have a horse in t… Continue reading Anton and The Great XDR Debate, Part 1