Advanced persistent threats (APTs) have become a particularly common type of cyber attack used by cyber criminals and state-sponsored actors looking to gain continuous access to government and private organizations’ networks. These attacks are extremely difficult to defend against, due to their so
In March, the U.S. Office of Management and Budget (OMB) released a report on the cyber performance of federal agencies, revealing that a total of 30,899 cyber incidents were reported by them in fiscal 2016. The OMB states that this
Critical infrastructure is always a common target of cyber criminals. Similar to other countries, the Department of Defense (DoD) is a crucial part of the critical infrastructure in the United States, and as such, it is often exposed to various
Security Orchestration and Automated Response (SOAR) is a relatively new cyber security solution category. The aim of these platforms is to provide a centralised software solution to manage the complete lifecycle of a cyber incident, orchestrate security products to a determined goal, and respond to
What’s wonderful about all our security industry and specifically the products, is that we constantly see similar fancy dashboard reporting. These views focus on an abundance of information being displayed to aid users trying to correlate and make historical data relevant. It’s vital data but I
The greatest challenge for every organization that deals with cybersecurity threats is how to reduce its reaction time when responding to an incident and recover as soon as possible in order to minimize the consequences and contain the damage.
A new study that was recently published by the Univer
The typical cybersecurity incident response process is carried out in several stages, and mitigation activities are a significant part of that process, as they are meant to help eradicate an incident and prevent it from expanding. The Cyb
Health care institutions are facing an increasing risk of cyber attacks. There are a few reasons why organizations providing health-care services are under such a high cybersecurity threat, with the increase utilization of IoT devices singled out by security experts as the leading one over the last
Faced with the growing threat of cyber attacks and the challenges involved in recovering from various cybersecurity events, New York state’s authorities have rolled out new cybersecurity regulations that apply to financial institutions operating within the state.
Many organizations often complain about having to abide by strict regulations regarding government notification of cybersecurity events, claiming that such mandates only put them under an extra strain, in terms of increased expenses and unnecessary burden on their employees.
But, given that the r
In many aspects, cyber crimes are similar to other, more traditional types of crimes. Forensic investigation and analysis of the evidence recovered at the crime scene are among the aspects that cyber attacks have in common with other crimes. These are some of the key components of a fast and
People working in cybersecurity nowadays face numerous challenges on a regular basis. Starting from having to deal with advanced threats, through managing third-party risk, ending with ensuri
“Noise” is a prevalent term in the cyber security industry. DFLabs consistently receives feedback from vendor partners and clients that one of the major issues they face daily is the ability to sift through noise in order to understand and differentiate an actual critical problem from a wild go
The Canadian Securities Administrators (CSA) continues to ramp up its efforts for improving cybersecurity for reporting issuers, which include companies with publicly traded securities. The latest step in this direction i
In the upcoming months we will share details that outline our successful methodology “Supervised Active Intelligence”. We envision a world where your security team is empowered with all the information they need to make an intelligent, informed security decision based on coordinated information,
Cyber-attackers never stop inventing new and more creative methods and techniques that are supposed to be more difficult to prevent. One of the most common types of attacks nowadays are the Distributed Denial of Service (DDoS) attacks, which are on the rise recently, unlike data breaches, acc
In my role as VP of Services at DFLabs, I get the opportunity to speak to stakeholders at every level pertaining to concerns they have about their current cyber incident response processes and how they are currently dealing with the challenges. From the analyst who deals with an ever-increasing num
As part of its efforts to improve the country’s cybersecurity, the U.S. Department of Homeland Security has issued an updated
Back in September, 2016, the New York State Department of Financial Services proposed a set of rules aimed at improving cybersecurity among financial institutions. If accepted, the proposed rules will make it mandatory for banks and other financia
When it comes to protecting your organization against cyber incidents, you can never be too careful. The methods and techniques employed by cyber criminals are becoming increasingly sophisticated with each passing day, requiring you to adapt and improve your cyber defense accordingly. One of the mos
Protecting customer data and intellectual property is among the top priorities for government agencies, as well as corporations across many different industries, such as healthcare, finance, entertainment, and insurance, to name a few. The main goal of data breaches - which are extremely common in o
Considering that we live and work in an increasingly connected world, it can be said that nowadays there is no organization that is immune to cyber attacks and data breaches. No matter how sophisticated your cyber defense is, you always need to be prepared for all eventualities that might arise from
Financial institutions are always at a great risk of falling victims to cyber-attacks. They are under a constant threat of being attacked by hackers looking to obtain confidential information that can be potentially very lucrative. In a bid to make sure banks are prepared to respond to cyber threats
Although cyber security solutions are advancing at an extraordinarily fast pace, the harsh reality is that cyber attacks will continue to occur and hackers will continue to breach the networks and computer systems of businesses and government agencies around the globe.
All cyber security experts
With cyber-crime on the rise globally, it’s clear that law enforcement agencies around the world need to raise their level of cyber-security preparedness so that they can respond to this growing threat accordingly. But, it seems that improving their own digital skills has turned out to be a tough
The healthcare industry is under a constant threat of cyber attacks, mostly due to the fact that organizations within this sector keep a variety of confidential and pertinent information, such as credit card information, social security numbers, insurance-related information, and some believe most i
Is Threat Intelligence Still Useful?
The importance of information in business in today’s modern world is invaluable. But, in some cases, having large amounts of information coming your way can actually hurt your business. This holds true particularly for organizations that are constantl
On November 3, 2016, a new cyber incident reporting rule for Defensive Industrial Base (DIB) companies that are doing business with the U.S. Department of Defense (DoD) has gone into effect.
DFLabs previews new cyber incident response playbook for Asian regulatory environment
Boston – November 7, 2016 – DFLabs, the global leader in cyber incident response automation and orchestration, announced today its Vice Pr
Back in July, the European Parliament adopted the Directive on Security of Network and Information Systems (NIS Directive), which is primarily aimed at enhanci
DFLabs - Cyber Incidents Under Control - a world leader in automated incident, breach response, and orchestration security, is excited to announce it has launched its new and improved website.
Featuring a modern design with intuitive functionality, the new website gives visitors a g
This past summer, many cyber security experts expressed their concerns that certain Russian groups were involved in the hacking attack on the U.S. Democratic National Committee’s (DNC) computer network, leaking 20,000 emails from various Democratic Party officials.
No matter who the perp