Articles on Incident Response
- Career Security Trends and Your Career Plans Information security trends like operationalization, hypersegregation, and active defense create opportunities for both IT operations and security professionals. Operations personnel can expand into...
- Incident Response Why Organizations Don't Prepare for Information Security Incidents Organizations fail to prepare for security incidents not because they're unaware of threats, but because they believe they personally won't be attacked and underestimate the disruptive effects of...
- Malware Anticipating Cyber Threats Beyond APT Organizations that experienced APT attacks years ago may offer insights into threats that will eventually reach other companies. Predicted trends include greater use of purchased exploits,...
- Training Free Recorded Malware Forensics and Analysis Webcasts
- Malware When Indicators of Compromise (IOCs) Entered the Mainstream Enterprise Indicators of Compromise (IOCs) are custom, incident-specific signatures that organizations use to detect attacker artifacts. Mandiant popularized the term around 2007, and by 2015 the concept gained...
- Malware Who Was the First to Use the Term Exfiltration in Cybersecurity? The term "exfiltration" in cybersecurity—referring to data leaving a compromised network—appears to originate from military terminology about withdrawing troops from dangerous positions. The earliest...