Tag: database

A database containing 900 gigabytes of customer data and support requests for the Israeli firm Cellebrite was stolen and leaked to the website Motherboard. Cellebrite makes technology that helps law enforcement agencies get data off of mobile devices.

Surveillance Technology Vendor Cellebrite Has Customer Data Stolen

In-brief: Cellebrite, an Israeli firm that sells mobile phone forensic tools, was the victim of a hack that stole information on customers – many of them law enforcement agencies and governments.

The New York Times expose on the hacks of the DNC is a case study in how not to respond to a cyber attack. We talk with Tim Bandos of Digital Guardian about building a cyber threat hunting capability.

Don’t Be The DNC: An Introduction to Enterprise Threat Hunting

In-brief: The New York Times expose on the hack of the Democratic National Committee is a case study in how not to respond to a cyber attack. In this video interview with Tim Bandos of Digital Guardian, we talk about how to do it right. His new ebook on hunting digital threats in the enterprise explains that incident response doesn’t have to cost a fortune. 

2017 will be another year characterized by attacks on healthcare organizations, as ransomware and identity theft drive cyber criminal interest in hospitals and health provider networks.

2017: the Year of the Healthcare Breach (Again) | Data Insider

In-brief: The new year won’t bring relief for the healthcare industry, which faces a range of new, sophisticated attacks seeking paydays and access to electronic health records, a new survey by Experian finds.

Despite a rising tide of data breaches, our tools for responding to them are inadequate and little changed. Why?

Sign Up with the Usual Suspects: Consumer Breach Response is Broken and How to Fix It | Digital Guardian

In-brief:The scourge of data breaches and identity theft is more than a decade old. But our tools for dealing with these common incidents are outdated and ineffective. Why? (Editor’s note: this blog post has been cross posted from Digital Guardian’s blog, where you can read it in its entirety.) 

Seven teams of finalists will program machines to play against other machines for a $2 million top prize.

DARPA Grand Challenge Spurs Automation, AI to Secure Internet of Things

In-brief: A hacker capture the flag tournament will take place without any human intervention. It’s the final competition in DARPA’s Cyber Grand Challenge, a contest to spur developments in automation and artificial intelligence to solve cyber security problems.