October 19, 2018 | Tools & Templates | Incident Response Planning
When is it best to clean malware using tools, and when is it better to re-image? In this Viewpoints report, IANS Faculty Jake Williams, Jason Gillam, Adam Shostack, Kevin Beaver, Davi Ottenheimer and Dave Kennedy offer their recommendations.
How can a security team avoid becoming overloaded once end users are empowered to flag and report suspicious email? In this Viewpoints report, IANS Faculty Marcus Ranum, Kevin Beaver and Ondrej Krehel recommend several technology- and process-based solutions.
Theft of cryptocurrency from exchanges and infrastructure climbed to $950 million in 2018 at an 84% compound annual growth rate (CAGR) from 2016. More than three-and-a-half times more cryptocurrency was stolen from exchanges in 2018 than in 2017.
What are the best solutions for on-premises DDoS mitigation? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford explains the pros/cons of the Top 3 vendors – Radware, Arbor and F5 – and details the latest trends in the space.