Chatbots, Maintenance and Monitoring: Security Automation

Last week the Identity Theft Resource Center (ITRC) unveiled its virtual victim assistant, ViViAN, to serve identity crime victims after-hours and on weekends. Developed in partnership with the SAS Institute, an anti-fraud software and services compan… Continue reading Chatbots, Maintenance and Monitoring: Security Automation

Taking Inventory – Where Do We Stand With AI and ML in Cyber Security?

Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep … Continue reading Taking Inventory – Where Do We Stand With AI and ML in Cyber Security?

Evaluating XDR Against EDR, SIEM and SOAR Solutions

XDR, shorthand for the emerging Extended Detection and Response solution offerings, has quickly established itself as one of the best options for defending the modern enterprise IT infrastructure against cyberattacks. But many are still trying to … Continue reading Evaluating XDR Against EDR, SIEM and SOAR Solutions

New Video: MixMode Cyber Anomaly Detection Platform

We recently released a new video to better explain how MixMode’s next-generation cybersecurity anomaly detection platform combines the functionality of SIEM, NDR, NTA and UEBA for advanced threat detection, zero day attack identification, false positiv… Continue reading New Video: MixMode Cyber Anomaly Detection Platform

Accellion Data Breach Highlights Third-Party Risk

Two mega-breaches caused by third parties earlier this year, following the SolarWinds supply chain hack created a growing tsunami of third-party risk for enterprises and government organizations. Security software provider Accellion also suffered a br… Continue reading Accellion Data Breach Highlights Third-Party Risk

DarkSide Ransomware Gang Struck Down — but by Whom?

DarkSide, hackers of the Colonial Pipeline, has hurriedly shut up shop. It claims that its servers and cryptocurrency balances have disappeared.
The post DarkSide Ransomware Gang Struck Down — but by Whom? appeared first on Security Boulevard.
Continue reading DarkSide Ransomware Gang Struck Down — but by Whom?

CrowdStrike Deepens Security Ties with Google

CrowdStrike has extended its relationship with Google Cloud to make it possible to bi-directionally share telemetry and data between CrowdStrike Falcon cloud service for protecting endpoints and security offerings from Google such as Chronicle, VirusT… Continue reading CrowdStrike Deepens Security Ties with Google

DarkSide Offered Ransomware-as-a-Service Before Pipeline Attack

Colonial Pipeline might be tight-lipped about the vulnerability hackers exploited to launch a ransomware attack that shut down the U.S.’s largest pipeline, but details are emerging about the DarkSide ransomware variant behind the attack and the cyberc… Continue reading DarkSide Offered Ransomware-as-a-Service Before Pipeline Attack

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

It’s evident that while organizations are spending more and more on legacy cybersecurity solutions, these platforms are not holding up their end of the deal and are not able to proactively defend in a modern, non-signature attack threatscape.
The post … Continue reading The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

Colonial Pipeline FAIL: Ransomware Gang Threatens Gas Supplies

The Colonial Pipeline is critical infrastructure—of that there’s no doubt. But ransomware scrotes have crippled it.
The post Colonial Pipeline FAIL: Ransomware Gang Threatens Gas Supplies appeared first on Security Boulevard.
Continue reading Colonial Pipeline FAIL: Ransomware Gang Threatens Gas Supplies