This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
Security Magazine logo
  • MAGAZINE
    • Digital Edition
    • This Month's Issue
    • Archives
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
    • Call for Entries
  • CONTACT
    • Advertise
    • Editorial Guidelines
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Keywords » incident response

Items Tagged with 'incident response'

ARTICLES

us-capitol

Security practices state Capitols should put in place today

Stel valavanis onshoresecurity
Stel Valavanis
February 1, 2021
As lawmakers and law enforcement continue to unravel the events and impact of the crisis at the U.S. Capitol on Wednesday, January 6th, attention is turning to identification and prosecution of those that illegally entered, attacked, and looted the Capitol and the offices of the legislature housed there. We’re learning more about the litany of security failings and it is imperative that we take the lessons offered by this example and make the changes they demand now, at our state capitol buildings, as well as in our businesses.
Read More
SEC0818-cyber-feat-slide1_900

SOC experts report cyber skilling obstacles

January 29, 2021

In the fourth quarter of 2020, Cyberbit surveyed hundreds of Security Operations Center (SOC) Managers, Analysts, and Incident Responders participating in training sessions on their opinions and observances within the current cyber skilling climate. The culminating report reveals how organizations are currently building the human element of their InfoSec organization—shedding light on current practices including job requirements, the recruiting process, current skills levels, training impacts, and integration of industry best practices.


Read More
Brian Nicholls

Brian Nicholls to coordinate community engagement and safety initiatives at University of Utah

Special Assistant to the Chief Safety Officer to manage racist and bias incident response process and support a holistic approach to safety
January 22, 2021

Brian Nicholls, Special Assistant to the Chief Security Officer (Marlon C. Lynch), will coordinate community engagement initiatives with organizations across the University of Utah, as well as implement new response protocols developed by the Racist and Bias Incident Response Team. 


Read More
steve bergman

Kroll adds three seasoned cybersecurity experts to Cyber Risk practice

January 21, 2021

Kroll, a division of Duff & Phelps, announced the hiring of three seasoned cyber experts in North America: John (Jack) Bennett, a managing director in the San Francisco office; Steve Bergman, a managing director in the Washington D.C. office; and John deCraen, an associate managing director in the Dallas office.


Read More
cyber hack

International Cyber League competition aims to find the world's best cyber defense team

Competition will put professionals through hyper-realistic attack simulations
January 12, 2021

Cyberbit announced the launch of the International Cyber League (ICL), a first-of-its-kind competition that will determine the world’s best cyber defense team. The League will begin with America’s Cyber Cup, with registration opening today and closing on Monday, February 22. To determine the world’s best team, qualifying teams will face off against simulated cyberattacks in Cyberbit’s hyper-realistic cyber range, crowning the winning team as North America’s best.


Read More
cyber_lock

Companies need to enhance cybersecurity amid the continuation of COVID-19 in 2021

Bob ackerman
Robert R. Ackerman Jr.
January 7, 2021

Is your company’s cybersecurity policy as effective as it should be amid these tumultuous times? And if you’re not an employee but the owner of a small business – typically someone with much less sophisticated cybersecurity protection – how does your online security stack up? The answer: Cybersecurity has improved, but markedly more has to be done to secure networks in 2021, the second year of the pandemic, as the number of cyberattacks has become staggering.


Read More
AI-cyber

New cyber defense feed protects government systems in live trial across four states

December 30, 2020
A new automated data feed that helps defend state and local government computer systems from cyberattacks and rapidly blocks threats across state lines reduced cyber defense time from some three days to less than three minutes in a successful pilot program across four states.
Read More
Most Countries without Cybersecurity Strategy

US Secret Service hosts cyber incident response simulation

December 15, 2020
The US Secret Service hosted a virtual Cyber Incident Response Simulation for financial services, real estate, retail and hospitality executives who trained on mitigation strategies for a simulated business email compromise (BEC) attack. Business Email Compromise is a sophisticated scam targeting both businesses and individuals performing a transfer of funds. The scam is frequently carried out when a subject compromises legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.
Read More
Solving the detection puzzle in security operations centers

The pervasive problem of inferior detection in your SOC

Karthik Kannan
December 7, 2020
Security operations centers need to solve the detection puzzle, creating human experience that is less tedious and more productive. The overall solution must give security professionals and the enterprise a consistent view of security preparedness, and the necessary implementations to keep their coverage high and their alerts rich. So where do you start?
Read More
cyberwall

How to maximize traffic visibility with virtual firewalls

Dr. Edward Amoroso
November 24, 2020
Few cybersecurity components are as familiar as the next-generation firewall (NGFW) for enterprise protection. Despite this ubiquity, it is common for security teams to operate their NGFW in a suboptimal manner. The TAG Cyber team has observed, for example, that many enterprise teams operate their NGFW more like a traditional firewall. This can result in a reduction of traffic visibility, which in turn degrades prevention, detection, and response.
Read More
More Articles Tagged with 'incident response'
Subscribe For Free!
  • Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

Close
Sponsored content bnp covid  3j9fmqpy3i  1
Sponsored By
SureView Operations

How command centers are responding to COVID-19

In recent months, I’ve had many different conversations with our customers about how the COVID pandemic has impacted their security operations—from global companies with hundreds of thousands of employees to much smaller organizations with control rooms responsible for local operations and campuses. The overwhelming feedback is that everyone has needed, in one way or another, to change their processes, and expect to continue having to do so for the foreseeable future.

Popular Stories

USA flag

China has stolen the personal data of 80% of American adults

ransomware - cyber

Kia Motors allegedly suffers ransomware attack; cybercriminals demand $20 million to recover sensitive data

Potawatomi Casino implements temp detection and touchless weapons detection for improved safety and security

Milwaukee-based Potawatomi Hotel & Casino implements touchless screening for guests

cyber

Top 10 cybersecurity predictions for 2021

Security guards Allied, gardaworld and G4S

GardaWorld and Allied Universal to enter bidding war over G4S

2.16_SEC_SBS_REV_360X180_customcontent

Events

September 24, 2020

Pandemics, Recessions and Disasters: Insider Threats During Troubling Times

ON DEMAND: The insider threat—consisting of scores of different types of crimes and incidents—is a scourge even during the best of times. But the chaos, instability and desperation that characterize crises also catalyze both intentional and unwitting insider attacks. Learn how your workers, contractors, volunteers and partners are exploiting the dislocation caused by today's climate of Coronavirus, unemployment, disinformation and social unrest.

October 28, 2020

Industrial Cybersecurity: What Every Food & Bev Executive Needs to Know

ON DEMAND: There's a lot at stake when it comes to cybersecurity. Reputation, productivity, quality. Join us to discuss the future of your global security strategy and a path forward with trusted partners Cisco and Rockwell Automation, and turn your Food & Bev security challenges into strategic advantages that drive business value.

View All Submit An Event

Poll

Who has ownership or primary responsibility of video surveillance at your enterprise?

Who has ownership or primary responsibility of video surveillance at your enterprise?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security 500 360

The latest news and information

Content written for business-minded executives who manage enterprise risk and security

REGISTER TODAY
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing