It's important to remember: Incident response isn't a thing, it's a process. Read More ▶ |
|
| eGuide: Veritas Data protection is one of the most formidable challenges facing organizations today. Ransomware attacks that restrict access to important data until the attacker is paid are becoming increasingly common. Moving to the cloud is an option, but it's still important to have a disaster recovery plan in hand. And what about DRaaS? This toolkit aims to offer some ideas for grappling with data protection and disaster recovery. Read More ▶ | Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these issues in the coming year. Read More ▶ |
| The group behind the SamSam family of ransomware is known for recent attacks on healthcare organizations, but that's not its only target. Read More ▶ |
| | Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework. Read More ▶ |
| The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned. Read More ▶ |
| A ransomware attack against a SaaS provider hurts customers, but when it's a healthcare company that’s hit, patients suffer. Such was the case with January's attack against Allscripts, one of the largest electronic health record and practice management technology vendors. Read More ▶ |
| With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do. Read More ▶ |
| White Paper: Hitachi ID Systems, Inc. Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶ | CSO Insider | Editor's Picks |
|
|
|