February 16, 2018
February 1, 2018
January 31, 2018
January 17, 2018
January 10, 2018
January 5, 2018
In this article, FTI Consulting’s Global Head of Cybersecurity discusses the issued alerts as well as the importance of staying abreast of the most up-to-date intelligence on this front and organizations building a strong incident response programs to deal with emerging risks from Hidden Cobra and threat actors.
December 27, 2017
In this article, FTI’s Head of Cybersecurity comments on cyberspace becoming the new battlefield for modern warfare, the rise in malicious state-sponsored activity, the exploitation of information as a weapon for financial, political and other gain, and urges cybersecurity professionals to be prepared to stay ahead of malicious actors.
December 7, 2017
October 2, 2017
Security information and event management (SIEM) systems actively and continuously collect and document security-related events across an organization, providing a security team with alerts about potential threats or vulnerabilities. Such systems are designed to provide a single view across the massive datasets generated daily regarding an organization’s enterprise security, based on parameters defined by an […]
September 11, 2017
Recently, we learned that Equifax was breached via a simple web application weakness, and over 143 million consumers’ records were compromised. These records weren’t salacious emails or leaked Game of Thrones episodes; these were the Social Security numbers, home addresses, and the most sensitive financial data of millions of Americans.
September 9, 2017
Anthony J. Ferrante, FTI Consulting’s Global Head of Cybersecurity addresses the growing cybersecurity threats affecting U.S. businesses today. As the former Director for Cyber Incident Response at the U.S. National Security Council and the former Chief of Staff of the Federal Bureau of Investigation’s Cyber Division, Anthony J. Ferrante has seen cyber risk evolve from […]
August 22, 2017
This article discusses how IoT has evolved over the last two decades and the security risks that have emerged as a result. It will include a discussion of the key problems with IoT development and regulation, and the most pressing challenges security professionals need to consider when developing programs that include IoT security. The article also shares proactive steps organizations can take to establish or strengthen these programs.