Event anomalies can be an indicator of attack, but they can also just be an IT problem. New research suggests the latter might be more common than you think.
Truly resilient IT plans combine security and recovery so in the event an attack does infiltrate the firewall, it is critical that organisations have a plan that allows for rapid recovery and business operations as usual as quickly as possible.
Data on the endpoint did for Equifax, which is why, among other lessons learnt from the recent breach, visibility is a priority says Rick McElroy.
The US NCCoE at the NIST along with vendors and businesses within the cyber-security community teamed up to develop a recovery guide for firms hit with ransomware attacks.
AP Moller-Maersk, WPP, Reckitt Benckiser and FedEx are struggling to resume normal operations following the NotPetya ransomware attack.
With a reported 20,000 customers losing money over the weekend, Tesco Bank appears to be struggling to deal with the volume of customers demanding their money back. Should Tesco have been better prepared?
Rory Duncan argues that companies need to invest not only in detective and defensive controls, but also in the ability to take action when an attack is occurring
Andrew Sheldon discusses how there is considerable danger in allowing digital forensic triage to be carried out in haste or in ignorance
Shai Morag discusses the importance of endpoint visibility for a large organisation, what stands in the way of organisations maturing their endpoint visibility and ways technology can help ascertain this essential missing piece of the incident response puzzle.
A group of industry experts joined for a panel to discuss enterprise-wide cyber-incident response plans and proactive techniques for a rapid response and three of the four panellists agreed it's all about the people.
In today's cyber-threat landscape, the importance of incident response (IR) as a critical priority is fast gaining traction among the security community says John Bruce.
Roughly 77 percent of organisations are unprepared for cyber-security incidents according to research by NTT Com in its 2016 Global Threat Intelligence Report.
When it comes to cyber-security, almost half of organisations rely on luck to get them through a cyber-attacks says Bethany Mayer.
Haroon Malik describes how CISOs can develop a cyber-security resilience strategy by having a clear vision of where they are going and what needs to be done.