The World Economic Forum (WEF) is anticipating a cyberstorm, which calls for a global, unified response across geopolitical borders.
In ep. 33 of the Cybersecurity Minute, Frank Domizio explains how organizations have “tabletop training” for incident response in the event of a power outage or ransomware attack.
Lookout Principal Technical Marketing Manager Daniel Feller explains how behavior analytics is a foundational element of the Lookout Cloud Security Platform, which focuses on internet security, private apps, and SaaS apps.
Analyst Robert Wood explains a strategy for resolving data breaches that entails getting inside your adversary’s head.
While the realization of a cybersecurity incident of course brings primary impacts, it doesn’t stop there. In this analysis, Chris explains how and why preparation helps.
After a breach, you’ll need help from an incident response team, either in-house or third party. Frank explains how and what to look for.
Security and data breaches aren’t all bad news; they’re also opportunities to build on lessons learned and correct deficiencies, as Chris explains.
In Ep. 3 of the Acceleration Economy Minute, Kieron references the work of fellow AE cybersecurity analysts who discuss how and why organizations must expand on their approach to defense.
Bill Doerrfeld revisits the past decade of rising software vulnerabilities, which reinforces the need to patch compromised servers, use active threat monitoring, and prepare for quick responses to future zero-day exploits.
In Ep. 30, Chris Hughes reviews the recent phishing campaign that affected more than 130 companies and explains how hardware-based tokens and other modern SaaS security solutions can help.
In Cybersecurity Minute, Episode 26, Chris Hughes reacts to the recently discovered attack on cloned version of GitHub repositories carrying malicious code.
Data from Cloudflare exposes the top threats facing today’s web applications, including HTTP malformed requests, insecure API, & bots.
In this Cybersecurity Minute, Chris discusses the recent cyber attack on Samsung and the result of the source code being leaked.