<?xml version="1.0" encoding="UTF-8" ?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/">
 <channel>
  <title>FIRST Blog</title>
  <link>https://www.first.org/blog</link>
  <atom:link href="https://www.first.org/blog/rss.xml" rel="self" type="application/rss+xml" />
  <itunes:author>FIRST.Org</itunes:author>
  <itunes:owner>
    <itunes:email>media@first.org</itunes:email>
  </itunes:owner>
  <category>Business</category>
  <category>News</category>
  <category>Technology</category>
  <itunes:category text="Business"><itunes:category text="Non-Profit"/></itunes:category>
  <itunes:category text="News"><itunes:category text="Tech News"/><itunes:category text="Business News"/></itunes:category>
  <itunes:category text="Technology"/>
  <description>Learn more about the Forum of Incident Response and Security Teams through regular blog posts about our organization, events and other programs. Questions or comments? Contact first-press@first.org.</description>
  <dc:publisher>FIRST.Org</dc:publisher>
  <copyright>Copyright © 2017 by FIRST.org, Inc.</copyright>
  <pubDate>Fri, 27 Mar 2026 17:26:08 +0000</pubDate>
  <lastBuildDate>Fri, 10 Apr 2026 17:01:50 +0000</lastBuildDate>
  <generator>Tecnodesign (https://tecnodz.com)</generator>
  <language>en-us</language>
  <ttl>20</ttl>
  <image>
    <title>FIRST Blog</title>
    <link>https://www.first.org/blog</link>
    <url>https://www.first.org/_/img/1st.png</url>
  </image>
  <itunes:image href="https://www.first.org/_/img/1st.png"/>
  <itunes:explicit>false</itunes:explicit>  <item>
    <title>Seven signals cyber experts agreed on at FIRST Paris 2026</title>
    <link>https://www.first.org/blog/20260323-Paris-TC</link>
    <description>&lt;p&gt;The cybersecurity industry has been facing multiple parallel challenges in recent years. The pace at which cybercrime evolves is hard to match, but gatherings like FIRST provide a unique opportunity for the community to convene, reflect, and move forward together.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41172</guid>
  </item>
  <item>
    <title>Bangalore 2026 FIRST Technical Colloquium highlights resilience, AI, and community</title>
    <link>https://www.first.org/blog/20260319-Bangalore-TC</link>
    <description>&lt;p&gt;The 2026 FIRST Technical Colloquium in Bangalore brought together a group of security professionals and students for two days of practical learning, technical discussion, and community building on Cisco's campus on February 10-11, 2026. The event created space for attendees to exchange ideas, share lessons learned, and strengthen connections across the incident response community.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41171</guid>
  </item>
  <item>
    <title>Threats, Tech, and Tashkent: FIRSTUZ26 Recap</title>
    <link>https://www.first.org/blog/20260318-FIRSTUZ26-Recap</link>
    <description>&lt;p&gt;The 2026 FIRST Regional Symposium for Central Asia brought the global cybersecurity community to Tashkent, Uzbekistan over February 26-27, 2026, marking an exciting milestone for the organization. Hosted by UZCERT and INHA University in Tashkent, it was the very first regional symposium organized by the Forum of Incident Response and Security Teams (FIRST) in Central Asia, and it did not disappoint.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41170</guid>
  </item>
  <item>
    <title>The Trust Builders: FIRST’s African Liaisons</title>
    <link>https://www.first.org/blog/20260311-Trust-Builders</link>
    <description></description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Wed, 11 Mar 2026 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41168</guid>
  </item>
  <item>
    <title>2025 Vulnerability Forecast: Year-End Review</title>
    <link>https://www.first.org/blog/20251229-Vulnerability-Forecast-Review</link>
    <description>&lt;p&gt;As 2025 draws to a close, we find ourselves in the satisfying position of reviewing forecasts that worked. Next year’s forecast will look and feel a bit different, but you can expect that in January and we like to keep them separate.&lt;/p&gt;</description>
    <pubDate>Mon, 29 Dec 2025 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41159</guid>
  </item>
  <item>
    <title>Upskilling Communications</title>
    <link>https://www.first.org/blog/20251216-upskilling_communications</link>
    <description>&lt;p&gt;Sharing information in cybersecurity is vital for prevention and response. There’s a lot of technical processes available, and best practice to learn from. FIRST, for example, was created for that exact reason back in the 90s, to share techniques and information between teams.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Tue, 16 Dec 2025 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41153</guid>
  </item>
  <item>
    <title>Building Resilience Through Reporting</title>
    <link>https://www.first.org/blog/20251201-NatCSIRT</link>
    <description>&lt;p&gt;The Actioning Alerts and Advisories (A4) project aimed to improve threat reporting in cybersecurity by providing technical expertise, analysis, and communications support to National Cybersecurity Incident Response Teams (CSIRTs). The project worked with teams from four countries, fostering collaboration and knowledge-sharing&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Mon, 01 Dec 2025 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41142</guid>
  </item>
  <item>
    <title>Building Resilience Through Reporting</title>
    <link>https://www.first.org/blog/20251201-NatCSIRT</link>
    <description>&lt;p&gt;he Actioning Alerts and Advisories (A4) project aimed to improve threat reporting in cybersecurity by providing technical expertise, analysis, and communications support to National Cybersecurity Incident Response Teams (CSIRTs). The project worked with teams from four countries, fostering collaboration and knowledge-sharing
among stakeholders, and empowering CSIRTs to create actionable reports that can be used to prevent cyber threats.&lt;/p&gt;</description>
    <pubDate>Mon, 01 Dec 2025 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41143</guid>
  </item>
  <item>
    <title>2025 Q4 Vulnerability Publication Forecast</title>
    <link>https://www.first.org/blog/20251016-Q4Vulnerability-Forecast</link>
    <description>&lt;p&gt;Usually, we begin a blog post with a review of last quarter, but our volunteer team couldn’t get a forecast out last quarter. We had several pressing matters between multiple team members, and we apologise. So, we’ll move swiftly on to this quarter’s predictions.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/20240923-image01.png"/>
    <pubDate>Thu, 16 Oct 2025 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41141</guid>
  </item>
  <item>
    <title>Women of FIRST</title>
    <link>https://www.first.org/blog/20250616-Women-of-FIRST</link>
    <description>&lt;p&gt;Cyber Incident Simulation: Piecing Together an Attack Through a Public Policy Lens&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Mon, 16 Jun 2025 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41115</guid>
  </item>
  <item>
    <title>APAC DNS Forum 2025</title>
    <link>https://www.first.org/blog/20250603-APAC-DNS-Forum-2025</link>
    <description>&lt;p&gt;Peter Lowe, FIRST’s DNS Abuse Policy Ambassador, shares a review of the APAC DNS Forum in Hanoi, Vietnam, where he met with representatives from various organizations and had valuable discussions about DNS abuse and data sharing.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/20250603-image01.jpg"/>
    <pubDate>Tue, 03 Jun 2025 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41092</guid>
  </item>
  <item>
    <title>Black Basta Ransomware Leak: Key Findings and Insights</title>
    <link>https://www.first.org/blog/20250321-black-basta-ransomware-leak</link>
    <description>&lt;p&gt;A leak of 200,000 internal Black Basta chat messages reveals how a modern ransomware group structures its operations to attack victims, employing a range of tactics that, theoretically, should be easy to defend against.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Sun, 25 May 2025 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41086</guid>
  </item>
  <item>
    <title>Time to kick out Human Error?</title>
    <link>https://www.first.org/blog/20250418-Human-Error</link>
    <description>&lt;p&gt;Last year I opened a presentation with this: «Human error are the words cyber security guys use when they don't know shit». The response was laughter. But I think it is true. Here's why, and why it's relevant to incident responders.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Mon, 21 Apr 2025 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41085</guid>
  </item>
  <item>
    <title>2025 Q2 Vulnerability Forecast</title>
    <link>https://www.first.org/blog/20250408-Q2Vulnerability-Forecast</link>
    <description>&lt;p&gt;We’re expecting 9006 +/- 1259 vulnerabilities this quarter, as we close out the year.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/20250408-image01.png"/>
    <pubDate>Tue, 08 Apr 2025 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41078</guid>
  </item>
  <item>
    <title>The FIRST Board of Directors Launches FIRST’s Strategy Framework</title>
    <link>https://www.first.org/blog/20250303-Strategy-Framework</link>
    <description>&lt;p&gt;The FIRST Board of Directors is introducing a new structured approach to strategic planning, aimed at enhancing the organization’s ability to fulfill its mission and solidify its position as a global leader in cybersecurity and incident response.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Mon, 03 Mar 2025 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41065</guid>
  </item>
  <item>
    <title>Vulnerability Forecast for 2025</title>
    <link>https://www.first.org/blog/20250607-Vulnerability-Forecast-for-2025</link>
    <description>&lt;p&gt;In 2025 we expect another record-breaking year of CVE production. This year we expect 45505 +/- 4,363 CVEs to be published in the calendar year (CY). There’s a 5% chance the actual number exceeds the maximum (49868) and a 5% chance is less than the minimum (41142). Rather than give you a false sense of precision, it’s probably far easier to say we expect between 41-50k of vulnerabilities in calendar year CY 2025.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/20240923-image01.png"/>
    <pubDate>Tue, 25 Feb 2025 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41060</guid>
  </item>
  <item>
    <title>APAC DNS Forum 2025</title>
    <link>https://www.first.org/blog/20250604-APAC-DNS-Forum-2025</link>
    <description>&lt;p&gt;In 2025 we expect another record-breaking year of CVE production. This year we expect 45505 +/- 4,363 CVEs to be published in the calendar year (CY). There’s a 5% chance the actual number exceeds the maximum (49868) and a 5% chance is less than the minimum (41142). Rather than give you a false sense of precision, it’s probably far easier to say we expect between 41-50k of vulnerabilities in calendar year CY 2025.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/20240923-image01.png"/>
    <pubDate>Tue, 25 Feb 2025 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41091</guid>
  </item>
  <item>
    <title> Vulnerability forecast 2026: The Year Ahead</title>
    <link>https://www.first.org/blog/20260211-vulnerability-forecast-2026</link>
    <description>&lt;p&gt;As we turn the page on another year and raise our glasses to new beginnings, we at FIRST have been busy doing what we do best: thinking quantitatively about what lies ahead. And our forecast for 2026 is both sobering and, we hope, useful.&lt;/p&gt;</description>
    <pubDate>Tue, 11 Feb 2025 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41161</guid>
  </item>
  <item>
    <title>The 2024 Vulnerability Forecast: Year in Review</title>
    <link>https://www.first.org/blog/20250106-Vulnerability-Forecast-Year-in-Review</link>
    <description>&lt;p&gt;In calendar year 2024 we had another record breaking 40,704 CVEs published.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/20250106-image01.png"/>
    <pubDate>Mon, 06 Jan 2025 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41059</guid>
  </item>
  <item>
    <title>Ransomware Empowerment Training</title>
    <link>https://www.first.org/blog/20241220-FIRST-Ransomware-Training</link>
    <description>&lt;p&gt;The FIRST Multi-Stakeholder Ransomware SIG is very pleased to announce the release of the first version of the Ransomware Empowerment training. This has been a significant undertaking, requiring many months of dedicated effort from our dear SIG members. We have made it our priority to ensure that this training is TLP:CLEAR, so that it can be of benefit to all.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Mon, 23 Dec 2024 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41057</guid>
  </item>
  <item>
    <title>CVSS v4.0 Turns One Year Old</title>
    <link>https://www.first.org/blog/20241104-CVSS-v4_0-Turns-One-Year-Old</link>
    <description>&lt;p&gt;FIRST and the CVSS Special Interest Group (SIG) would like to wish a very happy first birthday to the newest version of CVSS, version 4.0!&lt;/p&gt;</description>
    <pubDate>Mon, 04 Nov 2024 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41039</guid>
  </item>
  <item>
    <title>2024 Q4 Vulnerability Forecast</title>
    <link>https://www.first.org/blog/20240923-Q4Vulnerability-Forecast</link>
    <description>&lt;p&gt;We’re expecting 9006 +/- 1259 vulnerabilities this quarter, as we close out the year.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/20240923-image01.png"/>
    <pubDate>Mon, 23 Sep 2024 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41035</guid>
  </item>
  <item>
    <title>From Fukuoka to Copenhagen: LAC’s Insights on the Latest Cyber Threat Trends</title>
    <link>https://www.first.org/blog/20240628-from-fukuoka-to-copenhagen</link>
    <description>&lt;p&gt;The 36th annual FIRST Conference, &quot;FIRSTCON24,&quot; was held from June 9 to 14, 2024, in Fukuoka, Japan. This marked the first time in 15 years that the conference was hosted in Japan, with the last event taking place in Kyoto in 2009. The conference saw a remarkable turnout with 997 participants from 99 countries and regions.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Fri, 28 Jun 2024 10:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:41034</guid>
  </item>
  <item>
    <title>Unveiling Active Directory Security Risks: A Comprehensive Analysis of Management Issues and Vulnerabilities</title>
    <link>https://www.first.org/blog/20240621-Unveiling_Active_Directory_Security_Risks</link>
    <description>&lt;p&gt;In this report, CyCraft research team analyzes 27 listed companies in Taiwan, Level-A government agencies and healthcare institutions, covering 46 AD Domains, with 1,057,000 objects included.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Fri, 21 Jun 2024 10:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40993</guid>
  </item>
  <item>
    <title>2024 Q3 Vulnerability Forecast</title>
    <link>https://www.first.org/blog/20240529-Q3Vulnerability-Forecast</link>
    <description>&lt;p&gt;As usual we like to verify our previous forecast before we make the next one. Due to travel, I must do this a few days before I should (normally on the 1&lt;sup&gt;st&lt;/sup&gt; of June).&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/20240529-image01.png"/>
    <pubDate>Wed, 29 May 2024 00:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40991</guid>
  </item>
  <item>
    <title>2024 Q2 Vulnerability Forecast</title>
    <link>https://www.first.org/blog/20240419-Q2Vulnerability-Forecast</link>
    <description>&lt;p&gt;So what are we expecting in terms of numbers of CVEs this quarter?&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/20240419-image01.png"/>
    <pubDate>Thu, 25 Apr 2024 10:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40970</guid>
  </item>
  <item>
    <title>The vulnerability forecast for 2024</title>
    <link>https://www.first.org/blog/20240109-vulnerability-forecast-2024</link>
    <description>&lt;p&gt;Every year we make a prediction to the number of vulnerabilities we expect to see published by NVD. We define this as the number published between New Year’s Day in 2023 to New Year’s Eve 2023, which is not the same as CVE’s that begin with 2023 as an identifier.&lt;/p&gt;</description>
    <pubDate>Thu, 11 Jan 2024 10:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40948</guid>
  </item>
  <item>
    <title>Is the LoA DoA for Routing</title>
    <link>https://www.first.org/blog/20231222-Is-the-LoA-DoA-for-Routing</link>
    <description>&lt;p&gt;Back in the early days of the Internet, when everybody knew everybody, the way that you validated yourself to a Certificate Authority (CA) for an X509 certificate for Secure Sockets Layer (SSL) was to send a fax on company letterhead.&lt;/p&gt;</description>
    <pubDate>Fri, 22 Dec 2023 10:30:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40947</guid>
  </item>
  <item>
    <title>The rising tide of vulnerabilities…might be more predictable than you think.</title>
    <link>https://www.first.org/blog/20231121-The-rising-tide-of-vulnerabilities</link>
    <description>&lt;p&gt;Over two days in late September, attack surface management teams, incident responders, data scientists, and vulnerability management practitioners gathered in Cardiff, Wales.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Wed, 22 Nov 2023 18:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40940</guid>
  </item>
  <item>
    <title>The 35th Annual FIRST Conference: Perspectives from a First-time Attendee</title>
    <link>https://www.first.org/blog/20230714-Perspectives-from-a-First-time-Attendee</link>
    <description>&lt;p&gt;In today's rapidly evolving digital landscape, the need for robust cybersecurity solutions has never been more critical.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Fri, 14 Jul 2023 00:01:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40891</guid>
  </item>
  <item>
    <title>M3AAWG 58 Meeting in Dublin, June 2023</title>
    <link>https://www.first.org/blog/20230630-M3AAWG-58-Meeting-Dublin</link>
    <description>&lt;p&gt;Sadly, this year I wasn't able to join everyone at the Annual FIRST Conference in Montreal. By all accounts it was a brilliant time and I'm genuinely jealous of everyone who got to be there - especially the DNS Abuse SIG members who got to meet up in person.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Fri, 30 Jun 2023 00:01:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40879</guid>
  </item>
  <item>
    <title>Predicting the volume of CVEs with Vuln4Cast</title>
    <link>https://www.first.org/blog/20230602-Predicting_the_volume_of_CVEs_with_Vuln4Cast</link>
    <description>&lt;p&gt;National CERT and CSIRT teams regularly need to write alerts on upcoming CVEs, and might want to know how many alerts to expect to write.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Fri, 02 Jun 2023 00:01:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40876</guid>
  </item>
  <item>
    <title>Inside Look: Adobe Incident Response Team Players - Lauren Park, Director, Security Coordination Center at Adobe</title>
    <link>https://www.first.org/blog/20230601-Inside_Look_Adobe_Incident_Response_Team_Players</link>
    <description>&lt;p&gt;Adobe has long focused on establishing a strong foundation of cybersecurity, built on a culture of collaboration, multiple capabilities, and deep engineering prowess. We aim to take a proactive approach to defending against security threats and issues and continuously monitor the threat landscape, learn from, and share our learnings with security experts around the world, and feed information back to our development teams to strengthen our products.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/"/>
    <pubDate>Thu, 01 Jun 2023 00:01:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40875</guid>
  </item>
  <item>
    <title>Remembering Andrew Cormack - by Serge Droz</title>
    <link>https://www.first.org/blog/20230510-remembering-andrew-cormack</link>
    <description>&lt;p&gt;It’s with great sadness that we learned Andrew Cormack had passed away in April. Andrew was more than just an expert. His curious and open mind inspired many in our community.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/_/img/news/firstpost2305-andrew-cormack.jpg"/>
    <pubDate>Fri, 12 May 2023 16:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40866</guid>
  </item>
  <item>
    <title>123456 again?! Why aren't we learning to address the human factor more successfully?</title>
    <link>https://www.first.org/blog/20230505-123456-again</link>
    <description>&lt;p&gt;People have become the main driver for breaches but the human factors remain insufficiently addressed in the IT security sector. We are working on changing that.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/20230503-fig1.png"/>
    <pubDate>Fri, 05 May 2023 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40862</guid>
  </item>
  <item>
    <title>DNS Abuse Techniques Matrix</title>
    <link>https://www.first.org/blog/20230228-DNS_Abuse_Techniques_Matrix</link>
    <description>&lt;p&gt;The DNS Abuse SIG is very pleased to announce the publication of the DNS Abuse Techniques Matrix, the work of many months and a great number of people from various parts of the security and DNS worlds.&lt;/p&gt;</description>
    <pubDate>Wed, 01 Mar 2023 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40858</guid>
  </item>
  <item>
    <title>Long Time No See!</title>
    <link>https://www.first.org/blog/20230223_long_time_no_see</link>
    <description>&lt;p&gt;&quot;Long time no see!” was the most popular phrase at the TF-CSIRT – FIRST Regional Symposium in Bilbao, Spain. And it has been a long time indeed – last time we met all together was in Malaga in 2020. We had some virtual events in the meantime, but it was certainly nice to see old faces and meet new colleagues in real life. The first joint post-pandemic event took place from 30th of January to 2nd of February, kindly hosted by the Basque Cybersecurity Centre.&lt;/p&gt;</description>
    <pubDate>Thu, 23 Feb 2023 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40856</guid>
  </item>
  <item>
    <title>ICANN was a massive success in getting the word out about DNS Abuse and FIRST</title>
    <link>https://www.first.org/blog/20221027_ICANN_was_a_massive_success_in_getting_the_word_out_about_DNS_Abuse_and_FIRST</link>
    <description>&lt;p&gt;In September, ICANN invited me to talk about DNS Abuse at the ICANN75 AGM in Kuala Lumpur, Malaysia. It was a great success! My presentation ‘The Challenge of Defining DNS Abuse’ was well received, and many attending industry specialists asked good questions, especially about FIRST's work. I made many valuable connections, including people from ICANN, the DNS Abuse Institute, registries, registrars, CERTs, commercial companies, government organizations, and many more.&lt;/p&gt;</description>
    <pubDate>Thu, 27 Oct 2022 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40851</guid>
  </item>
  <item>
    <title>Building a trusted and Cyber Secure Europe</title>
    <link>https://www.first.org/blog/20220805_building_a_trusted_and_cyber_secure_europe</link>
    <description>&lt;p&gt;The European Union Agency for Cybersecurity is dedicated to achieving a high common level of cybersecurity across Europe.
For more than 15 years, ENISA has played a key role in enabling digital trust and security across Europe, together with its stakeholders including the Member States and EU bodies and agencies.&lt;/p&gt;</description>
    <pubDate>Fri, 05 Aug 2022 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40840</guid>
  </item>
  <item>
    <title>Average Ransom Payment Up 71% This Year, Approaches $1 Million</title>
    <link>https://www.first.org/blog/20220729_Average_ransom_payment</link>
    <description>&lt;p&gt;With the recent release of the 2022 Unit 42 Ransomware Threat Report, we thought it would be a good time to take a quick look at ransomware activity that we’ve seen so far in 2022.&lt;/p&gt;</description>
    <pubDate>Fri, 29 Jul 2022 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40835</guid>
  </item>
  <item>
    <title>SOARs vs. No-Code Security Automation: The Case for Both</title>
    <link>https://www.first.org/blog/20220722_SOARs_vs_No-Code_Security_Automation_The_Case_for_Both</link>
    <description>&lt;p&gt;Just a few years ago, security orchestration, automation and response (SOAR) was the new buzzword associated with security modernization.
Today, however, SOAR platforms are increasingly assuming a legacy look and feel. Although SOARs still have their place in a modern SecOps strategy, the key to driving SecOps forward today is no-code security automation.
Read on to learn what lightweight security automation means, how it compares to SOAR and why SOARs alone won’t help you stay ahead of today’s security threats.&lt;/p&gt;</description>
    <pubDate>Fri, 22 Jul 2022 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40839</guid>
  </item>
  <item>
    <title>I Want the Needle and the Haystack: YARA + Security Analytics for Incident Response</title>
    <link>https://www.first.org/blog/20220715_I_Want_the_Needle_and_the_Haystack_YARA_Security_Analytics_for_Incident_Response</link>
    <description>&lt;p&gt;I want the needle, and the haystack to go along with it. Attackers take advantage of siloed data and security tools to exploit systems using misconfigurations and move laterally. This lateral movement across different attack surfaces has attackers flowing between the control plane and data plane of your environment to escalate privileges and seek out targeted access.&lt;/p&gt;</description>
    <pubDate>Fri, 15 Jul 2022 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40834</guid>
  </item>
  <item>
    <title>The Challenge of Defining DNS Abuse</title>
    <link>https://www.first.org/blog/20220519_The_Challenge_of_Defining_DNS_Abuse</link>
    <description>&lt;p&gt;DNS Abuse is a pretty widely used term. On the surface, it might seem like a simple term that's easily understood. But when you look more closely, the definition depends on your perception of the issue—and can be defined both broadly, or more narrowly.&lt;/p&gt;</description>
    <pubDate>Thu, 19 May 2022 13:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40829</guid>
  </item>
  <item>
    <title>FIRST Technical Colloquium in the Netherlands – sees global experts converge in Amsterdam to share knowledge and inspire collaborations</title>
    <link>https://www.first.org/blog/20220428_Chris_Gibson_TC_Netherlands</link>
    <description>&lt;p&gt;I had the absolute pleasure of participating in and attending the recent FIRST Technical Colloquium at the W Hotel in Amsterdam, Netherlands, April 12–14. It was great to see nearly 100 people attend and over 50 people participating in training at this long-awaited in-person event. The program featured 17 speakers and two on-site trainers who held several popular workshops.&lt;/p&gt;</description>
    <pubDate>Thu, 28 Apr 2022 01:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40827</guid>
  </item>
  <item>
    <title>Keep CSIRTs out of the lines of fire</title>
    <link>https://www.first.org/blog/20220224_GGE</link>
    <description>&lt;p&gt;FIRST encourages states to not attack CSIRTs and critical infrastructure&lt;/p&gt;</description>
    <pubDate>Thu, 24 Feb 2022 16:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40821</guid>
  </item>
  <item>
    <title>Automation SIG: A New SIG Adventure</title>
    <link>https://www.first.org/blog/20220105-Automation_SIG_A_New_SIG_Adventure</link>
    <description>&lt;p&gt;Every incident response team globally is facing a serious increase of workload. As attackers scan and penetrate networks via automation, so must defenders look
at automation.&lt;/p&gt;</description>
    <pubDate>Wed, 05 Jan 2022 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40816</guid>
  </item>
  <item>
    <title>Meeting in person at the FIRST Oslo Technical Colloquium</title>
    <link>https://www.first.org/blog/20211129-meeting_person_first_oslo_technical_colloquium</link>
    <description>&lt;p&gt;Last month, I was honored to be one of the planners and participants of the FIRST Technical Colloquium (TC) in Norway. Organized by FIRST members, the event was held just outside of Oslo at the Telenor Expo, Telenor headquarters in Fornebu.&lt;/p&gt;</description>
    <pubDate>Tue, 07 Dec 2021 17:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40813</guid>
  </item>
  <item>
    <title>Threat hunting: an outdated technique or a tactical advantage?</title>
    <link>https://www.first.org/blog/20210802-Threat_hunting_an_outdated_technique_or_a_tactical_advantage</link>
    <description></description>
    <pubDate>Mon, 02 Aug 2021 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40805</guid>
  </item>
  <item>
    <title>Velociraptor vs. PrintNightmare</title>
    <link>https://www.first.org/blog/20210726-Velociraptor_vs_PrintNightmare</link>
    <description>&lt;p&gt;Hunting a Zero day!&lt;/p&gt;</description>
    <pubDate>Mon, 26 Jul 2021 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40803</guid>
  </item>
  <item>
    <title>Ongoing campaign leveraging Exchange vulnerability potentially linked to Iran</title>
    <link>https://www.first.org/blog/20210719-Ongoing_campaign_leveraging_Exchange_vulnerability_potentially_linked_to_Iran</link>
    <description></description>
    <pubDate>Mon, 19 Jul 2021 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40802</guid>
  </item>
  <item>
    <title>Industry Peers Are the Path Towards a Collective Defense</title>
    <link>https://www.first.org/blog/20210712-Industry_Peers_Are_the_Path_Towards_a_Collective_Defense</link>
    <description></description>
    <pubDate>Mon, 12 Jul 2021 00:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40800</guid>
  </item>
  <item>
    <title>Thank You FIRST Community for Helping Team Cymru Reach a New CSIRT Assistance Program Milestone</title>
    <link>https://www.first.org/blog/20210118-Thank_You_FIRST_Community_for_Helping_Team_Cymru</link>
    <description>&lt;p&gt;Together, We’re Creating Better Threat Intelligence Sharing for the World&lt;/p&gt;</description>
    <pubDate>Thu, 28 Jan 2021 17:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40782</guid>
  </item>
  <item>
    <title>Preparing for Post-Intrusion Ransomware</title>
    <link>https://www.first.org/blog/20210111-Preparing_for_Post-Intrusion_Ransomware</link>
    <description>&lt;p&gt;This evolving and brutally effective threat can have a significant impact on an organization’s resources, finances, and reputation, but it can be stopped&lt;/p&gt;</description>
    <pubDate>Mon, 11 Jan 2021 17:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40786</guid>
  </item>
  <item>
    <title>Using similarity to expand context and map out threat campaigns</title>
    <link>https://www.first.org/blog/20210104-Using_similarity_to_expand_context_and_map_out_threat_campaigns</link>
    <description>&lt;p&gt;Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.&lt;/p&gt;</description>
    <pubDate>Mon, 04 Jan 2021 17:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40785</guid>
  </item>
  <item>
    <title>Forecasting: All for One and One for All in Cybersecurity</title>
    <link>https://www.first.org/blog/20201221-Forecasting_All_for_One_and_One_for_All_in_Cybersecurity</link>
    <description></description>
    <pubDate>Mon, 21 Dec 2020 17:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40781</guid>
  </item>
  <item>
    <title>Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity</title>
    <link>https://www.first.org/blog/20201214-Current_Events_to_Widespread_Campaigns</link>
    <description>&lt;p&gt;Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.&lt;/p&gt;</description>
    <pubDate>Mon, 14 Dec 2020 17:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40784</guid>
  </item>
  <item>
    <title>Pay2Key – The Plot Thickens</title>
    <link>https://www.first.org/blog/20201207-Pay2Key</link>
    <description>&lt;p&gt;Last weekend we issued a ransomware alert about a wave of attacks using a never-seen-before strain dubbed ‘Pay2Key.’ Our investigation suggested the ransomware operators were mostly targeting Israeli companies.  The ransomware used in the attacks spread rapidly across victims’ networks, leaving significant parts of the network encrypted along with a ransom note, threatening to leak stolen corporate data unless the ransom is paid.&lt;/p&gt;</description>
    <pubDate>Mon, 07 Dec 2020 17:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40780</guid>
  </item>
  <item>
    <title>Ethics, Responsibilities, Vulnerabilities</title>
    <link>https://www.first.org/blog/20200518_Ethics_Responsibilities_Vulnerabilities</link>
    <description>&lt;p&gt;Coordinated Vulnerability Disclosure is hard: Here is what to do about it.&lt;/p&gt;</description>
    <pubDate>Mon, 18 May 2020 15:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40762</guid>
  </item>
  <item>
    <title>Maturity Level 3 (Advanced) - Proactive...we’re ready for anything (mostly)</title>
    <link>https://www.first.org/blog/20190124-Maturity-Level-3</link>
    <description>&lt;p&gt;Hopefully what we’ve outlined as suggested services and functions a PSIRT could offer at the various stages of their development will be helpful and inspires your team to raise their game.&lt;/p&gt;</description>
    <pubDate>Thu, 24 Jan 2019 14:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40711</guid>
  </item>
  <item>
    <title>Maturity Level 2 (Intermediate) - I am reactive, but I’ve trained for it!</title>
    <link>https://www.first.org/blog/20190123-Maturity-Level-2</link>
    <description>&lt;p&gt;Are you mature, are you immature - what are you? Maturity Level 2 is about adapting the ad-hoc PSIRT strategies into full blown policies and processes.&lt;/p&gt;</description>
    <pubDate>Wed, 23 Jan 2019 14:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40710</guid>
  </item>
  <item>
    <title>The Beginning - a very fine place to start!</title>
    <link>https://www.first.org/blog/20190122-The-Beginning</link>
    <description>&lt;p&gt;To start you on your path to PSIRT goodness, you’ll want to read and digest the PSIRT Maturity Document created by your friendly global FIRST PSIRT representatives. And what’s a better place to start than at the beginning?&lt;/p&gt;</description>
    <pubDate>Tue, 22 Jan 2019 14:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40709</guid>
  </item>
  <item>
    <title>What is a PSIRT and where do I start?</title>
    <link>https://www.first.org/blog/20190121-What-is-a-PSIRT-and-where-do-I-start</link>
    <description>&lt;p&gt;The right place to get your fill on how to make a world-class Product Security Incident Response Team.&lt;/p&gt;</description>
    <pubDate>Mon, 21 Jan 2019 14:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40707</guid>
  </item>
  <item>
    <title>Cold Incident Response 2018</title>
    <link>https://www.first.org/blog/20181105_Cold_IR</link>
    <description>&lt;p&gt;An organizers view on the 2018 Oslo Technical Symposium&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/cold_ir_00.jpg"/>
    <pubDate>Mon, 29 Oct 2018 19:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40761</guid>
  </item>
  <item>
    <title>100 days on the board of directors of FIRST</title>
    <link>https://www.first.org/blog/20181029-100_days_on_board_of_directors</link>
    <description>&lt;p&gt;Alexander Jaeger shares his expirience after 100 days being on the board of directors of FIRST.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/board_SF_2018.jpg"/>
    <pubDate>Mon, 29 Oct 2018 19:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40699</guid>
  </item>
  <item>
    <title>FIRST address to the Global Commission on the Stability of Cyberspace</title>
    <link>https://www.first.org/blog/20180923-GCSC_address</link>
    <description>&lt;p&gt;Maarten Van Horenbeeck, Board Member of FIRST, delivers a statement to the Global Commission on the Stability of Cyberspace, in Singapore.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/gcscfirst.jpg"/>
    <pubDate>Sat, 22 Sep 2018 10:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40698</guid>
  </item>
  <item>
    <title>Ready to Respond to the Cyber Norms Debate</title>
    <link>https://www.first.org/blog/20180423-cyber-norms</link>
    <description>&lt;p&gt;Klée Aiken, APNIC's External Relations Manager, shares his views on cyber norms and how they will impact incident responders.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/Klee_Aiken_Cyber_norms.jpg"/>
    <pubDate>Mon, 23 Apr 2018 10:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40670</guid>
  </item>
  <item>
    <title>The GDPR and WHOIS privacy</title>
    <link>https://www.first.org/blog/20180412_GDPR_and_WHOIS</link>
    <description>&lt;p&gt;Background on the issue&lt;/p&gt;</description>
    <pubDate>Thu, 12 Apr 2018 07:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40669</guid>
  </item>
  <item>
    <title>CERT NZ Statement about WHOIS and GDPR</title>
    <link>https://www.first.org/blog/20180410-CERT_NZ_Statement_on_WHOIS</link>
    <description>&lt;p&gt;CERT NZ describes how important the usage of WHOIS is during an incident investigation.&lt;/p&gt;</description>
    <pubDate>Tue, 10 Apr 2018 07:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40668</guid>
  </item>
  <item>
    <title>A Long History of Building Trust and Engagement</title>
    <link>https://www.first.org/blog/20180327-A_long_history_of_building_trust_and_engagement</link>
    <description>&lt;p&gt;Microsoft's Principal Security Program Manager, Jerry Bryant, discusses a long history of building trust and engagement in security.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/Jerry_Bryant_cooperation.png"/>
    <pubDate>Tue, 27 Mar 2018 10:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40667</guid>
  </item>
  <item>
    <title>FIRST at the Global Conference on Cyberspace (GCCS)</title>
    <link>https://www.first.org/blog/20180106-FIRST_at_the_GCCS</link>
    <description>&lt;p&gt;An overview of the Global Conference on Cyberspace, and the work FIRST does in the policy community.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/GCCS_FIRST.jpg"/>
    <pubDate>Sat, 06 Jan 2018 10:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40665</guid>
  </item>
  <item>
    <title>Security, Incident Response, Privacy and Data Protection</title>
    <link>https://www.first.org/blog/20171211_GDPR_for_CSIRTs</link>
    <description>&lt;p&gt;EUrope is in the course of introducing completely new legisaltion regulation privacy and data protection. Much of the data that CSIRTs use potentially is affected by this.&lt;/p&gt;</description>
    <pubDate>Mon, 11 Dec 2017 13:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40664</guid>
  </item>
  <item>
    <title>Towards efficient cyber resilience</title>
    <link>https://www.first.org/blog/20171127_Resilience</link>
    <description>&lt;p&gt;As the internet becomes imorteant in every more areas of our daily lifes ways need to be found to ensure resilience.
The by far most important to achieve cyber resilience is collaboration across boarders.&lt;/p&gt;</description>
    <pubDate>Mon, 27 Nov 2017 10:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40663</guid>
  </item>
  <item>
    <title>Behind the scenes at the FIRST-tech team</title>
    <link>https://www.first.org/blog/20171107-new-CA</link>
    <description>&lt;p&gt;The FIRST tech team is re-working a lot of things behind the scenes. Some insights from the frontier.&lt;/p&gt;</description>
    <pubDate>Mon, 06 Nov 2017 16:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40659</guid>
  </item>
  <item>
    <title>Strengthening the community of Incident Response and Security Teams</title>
    <link>https://www.first.org/blog/20171030_Strengthen_Community</link>
    <description>&lt;p&gt;Recent updates from the Board of Directors about recent activities and an outlook what we are currently working on.&lt;/p&gt;</description>
    <pubDate>Wed, 01 Nov 2017 02:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40658</guid>
  </item>
  <item>
    <title>Training in emerging nations: Laying the seed to close the digital divide</title>
    <link>https://www.first.org/blog/20171017-Serge_Droz_education</link>
    <description>&lt;p&gt;For the longest time the growing Internet and digital communication was hailed as the path to a new and better world. But poorer countries where mostly left out from the benefits. Serge Droz writes about how FIRST delivers training in these regions.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/FIRST_map_20171017.png"/>
    <pubDate>Thu, 19 Oct 2017 10:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40657</guid>
  </item>
  <item>
    <title>Keynote by Brian LaMacchia: “Post-Quantum Cryptography”</title>
    <link>https://www.first.org/blog/20170616-Brian_LaMacchia</link>
    <description>&lt;p&gt;The FIRST Conference’s Keynote sessions concluded today with a presentation by Brian LaMacchia, Director of the Security &amp; Cryptography group within Microsoft Research (MSR). In this department, his team conducts basic and applied research and advanced development.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/Brian_LaMacchia_keynote.jpg"/>
    <pubDate>Sat, 17 Jun 2017 10:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40641</guid>
  </item>
  <item>
    <title>Keynote by Martijn de Hamer: “18 years old, it’s time to become mature”</title>
    <link>https://www.first.org/blog/20170615-Martijn_de_Hamer_keynote</link>
    <description>&lt;p&gt;Day four of the FIRST Conference began with a keynote presentation by Martijn de Hamer, the head of the National Cyber Security Operations Center (NCSOC) at the National Cyber Security Center (NCSC-NL) in the Netherlands. After having had various roles in the field of information security, de Hamer first started working for NCSC-NL (previously GOVCERT.NL) in 2005. Additionally, he is active in the field of CSIRT maturity and other aspects of CSIRT capacity building.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/MartijnDeHamer_keynote.jpg"/>
    <pubDate>Fri, 16 Jun 2017 01:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40640</guid>
  </item>
  <item>
    <title>Keynote by Florian Egloff: “Cybersecurity and the Age of Privateering”</title>
    <link>https://www.first.org/blog/20170614-Florian_Egloff_keynote</link>
    <description>&lt;p&gt;Day 3 of the FIRST Conference got started with keynote speaker Florian Egloff. Florian Egloff is a Clarendon Scholar, a D. Phil (PhD) Candidate in Cyber Security at the Centre for Doctoral Training in Cyber Security at the University of Oxford, and a Research Affiliate at the Cyber Studies Programme at Oxford University's Department of Politics and International Relations. He is currently working on his thesis entitled &quot;Cybersecurity and non-state actors: a historical analogy with mercantile companies, privateers, and pirates.&quot;&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/Florian_Egloff_keynote.jpg"/>
    <pubDate>Thu, 15 Jun 2017 23:55:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40638</guid>
  </item>
  <item>
    <title>Keynote by Darren Bilby: “A Decade of Lessons in Incident Response”</title>
    <link>https://www.first.org/blog/20170613-DarrenBilby_keynote</link>
    <description>&lt;p&gt;Day 2 of the FIRST Conference got started with keynote speaker Darren Bilby, a manager in Google’s Enterprise Infrastructure protection team, who is also a staff security engineer and self-described digital janitor. A 10-year veteran at Google, Bilby was the tech lead for Google’s Global Incident Response Team for six years, managed Google's European detection team in Zürich for two years and has also worked as a software engineer building out Google’s security tools. He was also the founder and a core developer of the open source GRR Incident Response project.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/Darren_Bilby_keynote.jpg"/>
    <pubDate>Tue, 13 Jun 2017 23:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40634</guid>
  </item>
  <item>
    <title>Opening keynote by Alex Stamos at the 29th Annual FIRST Conference in San Juan, Puerto Rico</title>
    <link>https://www.first.org/blog/20170613-Opening-Keynote-San-Juan</link>
    <description>&lt;p&gt;FIRST's Annual Conference kicked off on Monday morning, June 12th of 2017 with its opening keynote speaker, Facebook Chief Security Officer (CSO) Alex Stamos. As security lead for one of the world’s most noted companies, Stamos began his lecture with some of the biggest security challenges Facebook deals with.&lt;/p&gt;</description>
    <itunes:image href="https://www.first.org/blog/_media/Alex_Stamos_keynote.jpg"/>
    <pubDate>Tue, 13 Jun 2017 15:00:00 +0000</pubDate>
    <guid isPermaLink="false">firstnews:40635</guid>
  </item>
 </channel>
</rss>