Cyber incident reporting in SCADA systems gives us invaluable insight into the burgeoning threat landscape and helps the security community understand what threats we face, thus enabling teams to establish a robust defense strategy. However, the increase in the number of reports, each with different analysis...
Unlike popular TV crime shows, discovering clues for complex crime rings takes a lot more time than an hour. Investigative analysis is a detailed tradecraft where the clues to advancing investigations and solving crimes often span numerous sources of information in multiple locations.
As a result, law-enforcement...
Protecting an enterprise environment can sometimes feel like an uphill battle. Information security teams are often stuck in cyclical patterns where it feels as if the alerts never end and the attackers are constantly successful.
Unfortunately, this pattern is a symptom of organizations that live in reactive mode....
Forty years after the first DDoS attack, hackers are developing new ways to disrupt network security. DDoS mitigation techniques continue to evolve as attacks continue to grow in size, complexity, and malice. The bad guys, themselves, have evolved, too.
Without a comprehensive security solution, it's not just your...
Large attacks are growing as multi-vector exploits increasingly become the norm. In this report, Neustar, Inc. highlights new areas of growth in Distributed Denial of Service (DDoS) attacks over the past year.
The report affirms that DDoS attacks continue to be an effective means to distract and confuse security...
The 2018 cybersecurity landscape ushered in a blend of old and new threats, some of them game-changing, according to Trend Micro's Annual Security Roundup. Trend's Greg Young shares insight from this report.
Over the past year, cyber defenders have seen a high level of innovation from cybercriminals, who are leveraging new tactics, techniques and procedures (TTPs) to maintain persistence and counter incident response efforts.
To better determine how cybercriminals are hiding behind invisibility cloaks to remain...
Netscout is out with its latest threat report, and the research offers some startling new insights into DDoS, advanced threats and the commercialization of cybercrime. Hardik Modi offers analysis.
Every threat hunt starts with intelligence. As one of the industry's most comprehensive knowledge bases for adversary behavior, ATT&CK provides a structure for hunters to build their hypotheses and search for threats.
The latest report from Tenable Research analyzes vulnerability prevalence in the wild, highlighting the cyber threats that security practitioners are dealing with in practice - not just in theory. Our research shows that enterprises must triage more than 100 critical vulnerabilities a day. To better understand where...
This report provides a snapshot of events investigated by the eSentire Security Operations Center in 2018. With the exponential growth of cyber threats being a common theme in 2018, 2019 will present significant challenges for security teams looking to stay ahead of threats.
The 2018 Annual Threat Report provides...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.