In-brief: A website run by the National Health ISAC will serve as a clearing house for information on security vulnerabilities in medical devices, the first of its kind in the US.
Threats
What’s Driving Investment in Security Orchestration? A Conversation with Phantom Cyber
In-brief: Security orchestration and automation tools seemed like fantasy technology just a few years ago. But this year’s RSA Conference suggests that the time for automation tools may have arrived. In this interview, we talk with Oliver Friedrichs of Phantom Cyber.
Survey: Hackers for Hire Find Most Networks Easy Prey
In-brief: A survey of penetration testers by Rapid7 finds most organizations are failing to detect malicious activity on their networks.
File-less Malware Attacks Target Bank, Business Networks
In-brief: Security experts are warning that so-called “file-less” attacks on commercial networks operated by banks and other firms are spreading and harvesting sensitive information, like administrator user names and passwords.
Webinar: Deconstructing the Top IoT Attacks of 2016
In-brief: a recording and slides from the Security Ledger and Bastille’s recent webinar “Deconstructing the Top IoT Hacks of 2016” are now available online.