How Behavioral Detections Actually Discovered the SolarWinds Orion SUNBURST Attack

The post How Behavioral Detections Actually Discovered the SolarWinds Orion SUNBURST Attack appeared first on Security Weekly. Continue reading How Behavioral Detections Actually Discovered the SolarWinds Orion SUNBURST Attack

Top Security Trends for 2021 (and What They Mean for You)

2020 was a crazy year, and one none of us is likely to forget. But as we look ahead to 2021, here are five cybersecurity predictions and trends we think everyone should be aware of.
The post Top Security Trends for 2021 (and What They Mean for You… Continue reading Top Security Trends for 2021 (and What They Mean for You)

Why Network Data Should be the Foundation of Your Security Strategy

The post Why Network Data Should be the Foundation of Your Security Strategy appeared first on Security Weekly. Continue reading Why Network Data Should be the Foundation of Your Security Strategy

Sysmon Endpoint Monitoring: Do You Really Need an EDR?

The post Sysmon Endpoint Monitoring: Do You Really Need an EDR? appeared first on Security Weekly. Continue reading Sysmon Endpoint Monitoring: Do You Really Need an EDR?

What Security Data Do I Really Need to Collect and Analyze?

The post What Security Data Do I Really Need to Collect and Analyze? appeared first on Security Weekly. Continue reading What Security Data Do I Really Need to Collect and Analyze?

The Problem with Traditional Threat Detection and Response

Let’s face it: The current, standard approach to threat detection and response just isn’t cutting it. But now, a choice of two different cybersecurity solutions can overcome inherent challenges in most threat detection and response efforts in a wa… Continue reading The Problem with Traditional Threat Detection and Response

File Integrity Monitoring (FIM): Your Friendly Network Detective Control

Lateral movement is one of the most consequential types of network activity for which organizations need to be on the lookout. After arriving at the network, the attacker keeps ongoing access by essentially stirring through the compromised environment … Continue reading File Integrity Monitoring (FIM): Your Friendly Network Detective Control

Cybersecurity Maturity Model Certification (CMMC) In-Depth

In our first blog in this series, we introduced the new Cybersecurity Maturity Model Certification (CMMC) and described the five different levels of compliance. In this blog, we take a look at what is actually in each of these levels … and how ARI… Continue reading Cybersecurity Maturity Model Certification (CMMC) In-Depth