Cyber investigations, threat hunting and research: More art than science

While it’s true that threat hunting, incident response, and threat research all have their foundations in science (operating system theory and architecture, computer language and compilation, protocols, hardware and memory architecture, logic, etc.), t… Continue reading Cyber investigations, threat hunting and research: More art than science

Be a “dumbass”, like some of the world’s best cyber investigators

One of my closest friends in the cybersecurity industry has had a second-to-none career path. While in the employ of an industry leader in incident response, he was consistently their busiest forensic investigator, spearheading some of their most notor… Continue reading Be a “dumbass”, like some of the world’s best cyber investigators

CrowdStrike Security Cloud integrates with NDR and NTA solutions to defend against any threats

CrowdStrike announced a series of integrations with CrowdStrike Security Cloud that correlates the CrowdStrike Falcon platform’s enriched endpoint and workload telemetry with network telemetry for greater end-to-end visibility and contextual insights t… Continue reading CrowdStrike Security Cloud integrates with NDR and NTA solutions to defend against any threats

Security research project: The easiest way to get “experience” and land a job in cybersecurity

Despite what you might have heard, there’s no shortage of people looking for jobs in cybersecurity. Every open position triggers stacks of resumes, but the challenge is finding the right people with the right skills to do the job. Most resumes include … Continue reading Security research project: The easiest way to get “experience” and land a job in cybersecurity

Advice for aspiring threat hunters, investigators, and researchers from the old town folk

There’s a big cohort of security geeks who joined the industry around the turn of the millennium by either landing “infosec” jobs or, quite frequently, just by making infosec their job despite having some other formal job title. I count myself in this … Continue reading Advice for aspiring threat hunters, investigators, and researchers from the old town folk

Awake’s NDR platform strengthens cybersecurity across cloud, hybrid and IoT environments

Awake Security, the network detection and response (NDR) security division of Arista Networks unveiled platform enhancements that strengthen its ability to detect advanced threats, protect the unmanaged attack surface and autonomously perform threat hu… Continue reading Awake’s NDR platform strengthens cybersecurity across cloud, hybrid and IoT environments

Awake’s NDR platform strengthens cybersecurity across cloud, hybrid and IoT environments

Awake Security, the network detection and response (NDR) security division of Arista Networks unveiled platform enhancements that strengthen its ability to detect advanced threats, protect the unmanaged attack surface and autonomously perform threat hu… Continue reading Awake’s NDR platform strengthens cybersecurity across cloud, hybrid and IoT environments

Arista Networks Attack Surface Assessment: AI-driven threat hunting and incident response expertise

Arista Networks announced an Attack Surface Assessment, an advanced security service delivered through the recent acquisition of Awake Security. This new offering identifies cyber security risks from devices, users or third-party systems, especially th… Continue reading Arista Networks Attack Surface Assessment: AI-driven threat hunting and incident response expertise

Arista Networks acquires Awake Security to deliver proactive security for customers

Arista Networks announced that it has entered into a definitive agreement to acquire Awake Security, a Network Detection and Response (NDR) platform provider that combines artificial intelligence (AI) with human expertise to autonomously hunt and respo… Continue reading Arista Networks acquires Awake Security to deliver proactive security for customers

Your best defense against ransomware: Find the early warning signs

As ransomware continues to prove how devastating it can be, one of the scariest things for security pros is how quickly it can paralyze an organization. Just look at Honda, which was forced to shut down all global operations in June, and Garmin, which … Continue reading Your best defense against ransomware: Find the early warning signs