Tag: incident response

Here you will find all the articles with the tag: incident response.

Fox-IT makes incident response tool Dissect open source

Fox-IT makes incident response tool Dissect open source

Security firm Fox-IT has made Dissect open source. The tool automates incident response workflows. Fox-IT is publishing the source code in hopes of convincing other security companies to use and expand the tool. Dissect bundles several tools into a single environment. The environment consists of... Read more

date2 months ago
New SentinelOne RSO aims at automated incident response management

New SentinelOne RSO aims at automated incident response management

With the introduction of Remote Script Orchestration (RSO), SentinelOne allows companies to run large-scale remote response and recovery actions for endpoints in an automated manner. According to SentinelOne, RSO saves time and money throughout organizations' responses to potential breaches. Sen... Read more

date1 year ago
IBM Security X-Force sees surge in ransomware attacks in June

IBM Security X-Force sees surge in ransomware attacks in June

The amounts demanded as ransom are also exploding, up to as much as $40 million. IBM reports that as of September 2020, one in four attacks that its Security X-Force Incident Response has remediated this year have been caused by ransomware. In addition, ransomware incidents appeared to explo... Read more

date2 years ago
Microsoft’s SoftNER AI evaluates disruptions in cloud services

Microsoft’s SoftNER AI evaluates disruptions in cloud services

Microsoft uses unsupervised learning to collect data about disruptions to cloud services. According to researchers, it is no longer necessary to annotate large amounts of training data. Structured data is very valuable, especially in the field of cloud services. Not only can this data be used to... Read more

date2 years ago
Cisco publishes research manual for hacked Cisco equipment

Cisco publishes research manual for hacked Cisco equipment

Cisco has launched four manuals for incident responders who are investigating company equipment that they suspect has been hacked. The four manuals focus on four of the company's major software platforms. The manuals provide step-by-step plans on how to extract forensic information from hacked devic... Read more

date3 years ago
Many companies don’t notice cyber attacks until it’s too late

Many companies don’t notice cyber attacks until it’s too late

According to Kaspersky Lab, many companies only notice that a cyber attack takes place when it is already too late. The companies only ask for help when money or data has already been stolen, or when devices have broken down. Kaspersky Lab states that in a new report, IT Pro writes. Half of the inci... Read more

date3 years ago