Cindy Kaplan2024-07-02T18:12:33+00:00Tags: Breach, data breach, Incident response, Incident Response Plan, incident response process, IR planning, IRRaaS, Personally Identifiable Information, PHI, PII, Protected HEalth Information, security breach, third party|
ENDPOINT DETECTION AND RESPONSE: FIRE FOR EFFECT
The modern digital landscape is a battleground rife with adversaries ready (more…)
In the Wake of Backdoor.Regin: Accounting for the State Sponsored Threat
Recently the Symantec Corporation uncovered a highly sophisticated, modular piece of (more…)
How to Secure Your Assets from Cyber Sewage
There I was, (more…)
As Part of Your Incident Response Plan, Make Sure There are Needles in Your Haystack
Incident Responders take a lot of pride in finding that ‘Needle (more…)
A Word about the Target Data Security Breach
What happened to Target® last week is (more…)
Expecting the Unexpected, Removing Fear From a Security Incident
Once again another (more…)
The Best Malware Defense: Strategy First, Technology Second
I’m one of those fortunate information security professionals who plays both (more…)
An Open Letter to Antivirus Vendors: It is Time for Antivirus Software to Flag Memory Dumping
Dear Antivirus Vendors,
On more and more incident response (more…)