Cyber Security Publication
  • Advertise in Information security
  • Cybersecurity Hiring 2021
Home Tags Incident Response

Tag: Incident Response

Global Median Dwell Time Drops Below One Month: FireEye Report

Global Median Dwell Time (defined as the duration between the start of a cyber intrusion and when it is identified) has been reducing over...

Good Governance and Controls for Ensuring Data Privacy

There has been a misconception about privacy that confuses many people. People tend to share seemingly related or unrelated personal information online, such as...

Effective Security Incident Handling – The Need of the Hour

Today, cyberattacks are getting more complex, precise, and targeted than ever before. Add to this the sheer volume of security alerts and false positives;...

Five Key Cybersecurity Lessons from SecOps

Security Operations (SecOps) team members have interesting stories to tell about their run-ins with cyber adversaries. Some of these professionals have built and run...

New Code of Ethics “ethicsfIRST” Shines its Light on Global Ethics...

“Global Ethics Day” is celebrated on the third Wednesday of October across the world. This year it is celebrated on October 21, 2020. Founded...

NCSC Releases Cybersecurity Guidelines with International Allies

The U.K.’s National Cyber Security Centre (NCSC) joined hands with international cybersecurity agencies from five countries to issue security guidelines that intend to help...

Palo Alto Networks to Acquire Incident Response Firm Crypsis Group

Cybersecurity firm Palo Alto Networks entered into an acquisition agreement  with risk management and digital forensics consulting firm Crypsis Group in a proposed deal...

Need Based Evaluation of Cloud Services in the Wake of COVID-19

For many organizations, particularly those that may be considered legacy, or older existing enterprises, the recent COVID-19 pandemic may be pushing them to further...

The Human Component in the Security Operations Center

As cybersecurity challenges become more complex, the tendency is for organizations to focus on what piece of security technology they can acquire next. But...

Know Thy Enemy: Why Company-Centric Threat Intelligence is a Critical Element...

Today’s defenders can have reams of information and log data available to them, with databases chronicling known threats and attack patterns. Unfortunately, the information...

MOST POPULAR

RECENT POSTS