Security operations center, Part 2: Life of a SOC analyst 

In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates. In this part, we’ll take a look at the typical activities that SOC analysts carry …
The post  Security operations center, … Continue reading  Security operations center, Part 2: Life of a SOC analyst 

Understand Your Staff: How Insiders Shape Defenses

Enterprises and their staff dealt with a lot of change in 2020. The pandemic and resulting lockdowns forced organizations to allow staff to work from home. This vastly increased mobility, cloud computing and social networking usage; in some cases, thi… Continue reading Understand Your Staff: How Insiders Shape Defenses

Firewall Services and More: What’s Next for IT?

Firewall services, cloud network protection tools and other IT defense staples are seeing a lot of changes in 2021. IT landscapes are growing more complex, as are the defense systems that protect them. Remote work is common, and more work is moving to the cloud. Companies of all sizes will be looking to streamline digital defense. What […]

The post Firewall Services and More: What’s Next for IT? appeared first on Security Intelligence.

Continue reading Firewall Services and More: What’s Next for IT?

IT security under attack: Credential dumping attacks in Windows environments

Most of the time, threat actors in the cybersecurity landscape don’t employ advanced techniques and tools to intrude and establish a foothold within networks.  Often, they disguise malicious operations by mimicking the activities of legitimate users, l… Continue reading IT security under attack: Credential dumping attacks in Windows environments

Protect your organization against Adrozek

Adrozek is a malicious browser modifier that, when installed on users’ machines, infects them with adware. This particular strain of malware has been making rounds since May 2020; according to Microsoft, it was at its peak in August, when as …
The post… Continue reading Protect your organization against Adrozek

IT security under attack: Why are group memberships so crucial?

Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other privileged resources and data on your domain. Ever wondered how a simple misconfiguration… Continue reading IT security under attack: Why are group memberships so crucial?

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments.
Dubbed DCShadow, this is a late-stage kill chain attack that …
The post I… Continue reading IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

Sumo Logic Finds Attack Surface Expanding

An annual report published today by Sumo Logic, a provider of security tools delivered as a cloud service, highlights the degree to which security has fundamentally shifted in the age of the cloud. Based on an analysis of data culled from more than 2,… Continue reading Sumo Logic Finds Attack Surface Expanding

IBM CISO Perspective: Zero Trust Changes Security From Something You Do to Something You Have

As the chief information security officer (CISO) for IBM, I’m often asked by peers and colleagues, “What do you think of Zero Trust?” Or, perhaps more often, “What strategies are you using to keep IBM protected?”   First, many vendors in the security industry are looking at zero trust security from the wrong perspective. Security […]

The post IBM CISO Perspective: Zero Trust Changes Security From Something You Do to Something You Have appeared first on Security Intelligence.

Continue reading IBM CISO Perspective: Zero Trust Changes Security From Something You Do to Something You Have

5 user behavioral patterns to look out for in a decentralized workspace

Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe?
Solution: You should monitor your employees wherever they’re located, and devise a standard baseline of their behavior … Continue reading 5 user behavioral patterns to look out for in a decentralized workspace