Cyber attribution: Do you really need to know?

Cyber attribution: Do you really need to know?

Although Agatha Christie might disagree, sometimes mysteries should remain unsolved — at least in the cyber realm. Cyber attribution — finding exactly who perpetrated a given cyberattack — has seemingly become a cybersecurity goal in and of itself. But do organizations really need to know? Recognizing the “who” behind cyberattacks (not just the “what” and “how”) provides critical insights into the attacker’s objectives, infiltration methods, covert communication channels and more. Effective incident response hinges on…

Read More

The 3 C's of a successful security investigation

The 3 C's of a successful security investigation

Security professionals conducting internal investigations are faced with the challenge of gathering credible evidence to determine if, when, where, why and how an incident occurred. Cynthia Merchant, Associate Director, Global Security at pharmaceutical company Novartis, has worked in and built security functions for more than a decade, having held senior investigative roles at Phillip Morris International and Eli Lilly prior to her current position. “I see the security function as the hub of a bicycle…

Read More

Create a P.L.A.N. for security investigations

Create a P.L.A.N. for security investigations

Create a P.L.A.N. for security investigations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Employee investigations resolved faster with interview technology

Employee investigations resolved faster with interview technology

Employee investigations resolved faster with interview technology | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Port of New Orleans upgrades SOC with $500k in FEMA funding

Port of New Orleans upgrades SOC with $500k in FEMA funding

Port of New Orleans upgrades SOC with $500k in FEMA funding | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Gartner: Compliance reporting needs new value proposition

Gartner: Compliance reporting needs new value proposition

Gartner: Compliance reporting needs new value proposition | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Mike McPherson named SVP of Security Operations at ReliaQuest

Mike McPherson named SVP of Security Operations at ReliaQuest

<!– Mike McPherson named SVP of Security Operations at ReliaQuest | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

The rising cost of investigations and fraud risk

The rising cost of investigations and fraud risk

<!– The rising cost of investigations and fraud risk | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Investigations and privacy issues during the pandemic

Investigations and privacy issues during the pandemic

Investigations and privacy issues during the pandemic | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Tigran Gambaryan and Matthew Price added to Binance investigations team

Tigran Gambaryan and Matthew Price added to Binance investigations team

Tigran Gambaryan and Matthew Price added to Binance investigations team This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More