Incident Response

Incident Response | News, how-tos, features, reviews, and videos

12 incident response life preserver survival disaster recovery
forensics threat hunter cyber security thumbprint

security incident responder

ServiceNow adds new features to Major Security Incident Management Workspace

New features allow users to add their own report templates and format and configure reports based on requirements in MSIM platform designed to help teams track and resolve critical security incidents.

HP security

New Magnet Forensics app automates, coordinates cybersecurity response

Magnet's new application, Automate Enterprise, is designed to speed up investigation and response to cybersecurity incidents by automating basic and repetitive manual tasks, and integrating detection and post-incident tools including...

resilient resilience weed growing in desert by barcin via getty images

NIST's new cyber-resiliency guidance: 3 steps for getting started

The updated guidance provides goals and practical implementation advice, giving organizations a place to start with their cyber-resiliency efforts.

security threat - circuit board-hand knocking over a chess piece

12 steps to take when there’s an active adversary on your network

These steps will help you respond quickly, without letting a crisis turn into chaos.

A stressed businessman with head in hand sits at a desk and computer in an office workspace.

The emotional stages of a data breach: How to deal with panic, anger, and guilt

Intense situations require both the security experts and stakeholders to be calm and focused, but that is easier said than done. This advice can help.

cybersecurity ts

MITRE ATT&CK, VERIS frameworks integrate for better incident insights

The MITRE ATT&CK/VERIS collaboration aims to create a common dictionary for communicating information about security incidents.

A user reviews data and statistical models. [analytics / analysis / tracking / monitoring / logging]

5 best practices for designing application logs

Better logs make it easier to distinguish between critical data and noise. Here's how to design logs with security in mind.

Unitd States cybersecurity   >   U.S. flag with a digital network of locks instead of stars

CISA unveils Joint Cyber Defense Collaborative with tech heavyweights as first private partners

The new initiative aims to provide organizations with unprecedented levels of information and context with an initial focus on ransomware and incident response for cloud providers.

7 response plan be prepared are you ready typewriter

10 things to do now to reduce the cost of your next data breach

Taking these steps will save money, time, and reputation when that next breach hits.

8 getting breached is bad for business

Minimizing damage from a data breach: A checklist

How you respond to a data breach and the amount of damage it causes depends on how well prepared you are. Have you done everything on this list?

puzzle pieces / network / connections / component parts of a whole / microservices

Why XDR must include MDR

Technology alone isn't enough; organizations need help with security operations.

Strategy  >  Moving chess pieces as abstract data overlays the game

5 ways attackers counter incident response, and how to stop them

IR has become a chess match with attackers who can cleverly spoil responders' efforts and keep a foothold in systems. Here's how they do it and how to kick them out for good.

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

How to survive (and thrive) in the CISO hot seat

The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.

Special report: platforms play big in the cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

Load More
You Might Also Like