So you’ve been asked to start a threat intel program

What are the bumps in the road you can expect and avoid when setting up a threat intel progarm for your business?
Categories:

Business
How-tos

Tags: 101remediationThreat Intel

(Read more…)

The post So you’ve been asked to start… Continue reading So you’ve been asked to start a threat intel program

Traditional AV solutions shown ineffective in real-time global heat map

It’s no secret that antivirus technology (AV) has faced increased scrutiny in the tech industry for quite some time. One way to truly gauge the effectiveness of today’s traditional AV solutions is by analyzing real-world data. So, we did just that.

Categories:

Tags:

(Read more…)

The post Traditional AV solutions shown ineffective in real-time global heat map appeared first on Malwarebytes Labs.

The post Traditional AV solutions shown ineffective in real-time global heat map appeared first on Security Boulevard.

Continue reading Traditional AV solutions shown ineffective in real-time global heat map

Traditional AV solutions shown ineffective in real-time global heat map

It’s no secret that antivirus technology (AV) has faced increased scrutiny in the tech industry for quite some time. One way to truly gauge the effectiveness of today’s traditional AV solutions is by analyzing real-world data. So, we did just that.

Categories:

Tags:

(Read more…)

The post Traditional AV solutions shown ineffective in real-time global heat map appeared first on Malwarebytes Labs.

The post Traditional AV solutions shown ineffective in real-time global heat map appeared first on Security Boulevard.

Continue reading Traditional AV solutions shown ineffective in real-time global heat map

Vulnerability Management Metrics: The Final Frontier

In Part 1 of this series, we looked at some of the metrics that an executive team would want to see to identify how the business risk is trending. It is very important to keep in mind that if the business does not see the information security program a… Continue reading Vulnerability Management Metrics: The Final Frontier

Turning Data into Metrics: A Vulnerability Management Story

One of the main issues I find across the information security industry is that we constantly need to justify our existence. Organizations have slowly realized they need to spend on IT to enable their businesses. Information security, on the other hand,… Continue reading Turning Data into Metrics: A Vulnerability Management Story

Mimikatz Kerberos Golden Ticket

It has been an interesting year for attacks against the Windows credential model.  If you aren’t familiar with the Mimikatz “Golden Ticket” attack, it represents some of the best justification for guarding your domain administrator credentials with your life (if you really needed additional justification).  CERT EU published an excellent whitepaper on strategies for mitigating this […] Continue reading Mimikatz Kerberos Golden Ticket