What Is a DDoS Attack?

After 20 years, distributed denial-of-service (DDoS) attacks can still result in critical damage to businesses. Learn more about how to mitigate a DDoS attack on your corporate network.

The post What Is a DDoS Attack? appeared first on Security Intelligence.

Continue reading What Is a DDoS Attack?

Improve Your Detection Capabilities With Cyber Simulation Datasets

Every organization must develop methods of testing and improving existing detection capabilities, from on-paper assessments to a full-blown cyber simulation.

The post Improve Your Detection Capabilities With Cyber Simulation Datasets appeared first on Security Intelligence.

Continue reading Improve Your Detection Capabilities With Cyber Simulation Datasets

How to Track Agent-Based User Activity

More often than not we’ll need to go beyond a Severity 1 alert to figure out what a user (including a potentially malicious attacker) was doing on a system. Host events in particular only show a small part of the picture, and a single alert can&#… Continue reading How to Track Agent-Based User Activity

Comprehensive Vulnerability Management in Connected Security Solutions

To stay ahead of attackers, organizations should consider vulnerability management solutions that integrate with SIEM tools, network and threat modeling capabilities, and patch management systems.

The post Comprehensive Vulnerability Management in Connected Security Solutions appeared first on Security Intelligence.

Continue reading Comprehensive Vulnerability Management in Connected Security Solutions

5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays

These five retail cybersecurity tips will help organizations mitigate cyberattacks and provide customers with the safest shopping experience during the holiday season.

The post 5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays appeared first on Security Intelligence.

Continue reading 5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays

How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management

The lifecycle management of indicators is an important element to support decisions and actions against attackers. This process informs the courses of action matrix to build a response plan.

The post How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management appeared first on Security Intelligence.

Continue reading How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management

Applying Machine Learning to Improve Your Intrusion Detection System

Security analysts can train intelligent intrusion detection systems to distinguish between normal and malicious traffic by creating generic data sets.

The post Applying Machine Learning to Improve Your Intrusion Detection System appeared first on Security Intelligence.

Continue reading Applying Machine Learning to Improve Your Intrusion Detection System