incident response
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102734/bulb-400x200.jpg)
Enterprise security incident response trends to watch in 2018
Resolve Systems shared the top trends to watch in 2018 relating to incident response and automation. The list of predictions are founded on the company’s insight into the …
![Degree](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102927/college-degree-400x200.jpg)
Four ways colleges can strengthen their cybersecurity programs
If breaches can’t be entirely blocked, what can IT professionals in higher education do to prevent these kinds of disaster scenarios? The GovEd team at Logicalis US says …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103433/architecture-400x200.jpg)
Automating the hunt for cyber attackers
In this podcast recorded at Black Hat USA 2017, Mike Banic, Vice President, Marketing, and Chris Morales, Head of Security Analytics at Vectra Networks, talk about the use of …
![icosahedral](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103458/icosahedral-400x200.jpg)
How to select a suitable incident response program for your organization
All organizations, regardless of how well they think their walls are fortified, will at some point fall victim to an attack. How they respond to the attack could mean the …
![NTT Security](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103644/ntt_security-400x200.jpg)
Win a security gap assessment from NTT Security at Black Hat
This year at Black Hat 2017, NTT Security is focusing on incident response readiness: one lucky show participant will win a thorough security gap assessment from the NTT …
![firefighters](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111014/firefighters-400x200.jpg)
Companies unprepared to measure incident response
Companies struggle to keep up with and respond to cyberattacks due to lack of resources, according to Demisto. For example, more than 40 percent of respondents said their …
![Book](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103732/featured-adv_per_sec-400x200.jpg)
Review: Advanced Persistent Security
About the authors Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals. Araceli …
![struggle](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104202/struggle-400x200.jpg)
Rising volume of attacks overpowers security teams
New research from IDC that shows organizations are constantly under attack and struggling to keep up. The research finds most organizations run time-consuming security …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104223/idea-400x200.jpg)
5 incident response practices that keep enterprises from adapting to new threats
Security analysts within enterprises are living a nightmare that never ends. 24 hours a day, their organizations are being attacked by outside (and sometimes inside) …
![Review: Data Breach Preparation and Response](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104626/main-data_breach_preparation-400x200.jpg)
Review: Data Breach Preparation and Response
About the author Kevvie Fowler is a Partner and National Cyber Response Leader for KPMG Canada and has over 19 years of IT security and forensics experience. He is a SANS …
![Yahoo](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110354/yahoo-400x200.jpg)
Yahoo cookie-forging incident affected 32 million accounts
We finally know how many user accounts were affected by last year’s Yahoo cookie-forging incident: 32 million. What happened? “In November and December 2016, we …
![IBM Watson for cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105047/ibm-watson-cybersecurity-400x200.jpg)
IBM Watson to power cognitive security operations centers
At RSA Conference 2017, IBM Security announced Watson for Cyber Security, the industry’s first augmented intelligence technology designed to power cognitive security …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD