Data Breach Acceptance Replacing Breach Prevention?

The number of records lost, stolen or compromised in data breaches jumped 86% between 2015 and 2016 even though the number of breaches worldwide dropped 4% in the same period, suggesting that hackers are aiming at organizations with big databases. Read how data breach seems to have become a norm for businesses on Credit Union […]

Data Breach Notifications: What’s Optimal Timing?

Read Mathew J. Schwartz’s article about the optimal timing of when companies should notify users and authorities of data breach incident on Bank Info Security : Question: How quickly do organizations have to notify oversight agencies or affected consumers after they suffer a data breach? Answer: It depends. “Not too soon, not too late.” Read his […]

Almost half of UK business has NO cyber security plan

Almost half of UK businesses do not have a formal cyber security strategy implemented, despite the perilous nature of the current threat landscape. Read more about the new  IoD report titled Cyber security: Ensuring business is ready for the 21st century which reveals that only 57 percent of United Kingdom businesses have a cyber security […]

Verizon’s Data Breach Digest Uses Case Studies as Security Response Teaching Tools

Verizon’s annual Data Breach Investigations Report (DBIR) is one of the most respected studies on cybersecurity, cited by security professionals and security writers regularly and throughout the year. Although the 2017 DBIR was not released at RSA – it will come out later in the spring – Verizon did introduce its Data Breach Digest — […]

Do you have a cyber A-team?

Read Jeremy King’s article about why every organisation should have a A-team for any cyber security incident on CSO Online : Only experienced executives can create and improve a risk management, threat mitigation and cyber defense plan. And only people can implement and execute that plan. In a people-process-technology equation, without top talent nothing improves. The […]

What’s The Deal With Digital Forensics, Incident Response, And Attribution?

Read Andy Patel explain how the digital forensics, incident response and attribution can help a company against cyber attacks on F-Secure Blog : After several high-profile cyber attacks made big news headlines this year, it’s become evident to me, through online commentary, that there’s some confusion in the public space about how incident response services […]

Six key principles for efficient cyber investigations

Many organizations today are not equipped to defend against traditional cyberattacks, as demonstrated by the ever-increasing numbers of successful breaches reported daily – the Privacy Rights Clearinghouse’s latest number is 900,875,242 records breached in 5,165 attacks over the past decade – and that’s U.S. only. Read about the six key principles that companies should follow […]

Using Cyber Threat Intelligence to Support Incident Response

Read Adam Meyer’s article about how to use threat intelligence to support incident response on Security Week : As we see from the headlines and from all the FUD, there are many threats out there attacking from many different angles. New attacks, old attacks revisited, sophisticated attacks with numerous obfuscation layers, and simple attacks based […]

How to buy the best incident response tools for your enterprise

Read Kevin Beaver’s guide about how to buy the best incident response tools for your company on Tech Target : It’s not what happens to you but how you react to it that matters. This adage is said to date back many centuries but still serves us well today. Looking at it in terms of information […]

Why don’t all businesses have a good continuity strategy?

Read why Todd Scallan says that businesses lack a good continuity strategy on Help Net Security : It has been said that an ounce of prevention is worth a pound of cure. In the case of disaster recovery, however, businesses tend focus on prevention without anticipating the need for a cure. It may be painful […]