REMnux toolkit for malware analysis version 7 released

REMnux is a popular Linux-based toolkit for reverse-engineering malicious software which malware analysts have been relying on for more than 10 years to help them quickly investigate suspicious programs, websites, and document files. As the security in… Continue reading REMnux toolkit for malware analysis version 7 released

Closing the skills gap can minimize the business impact of cyberattacks

CISOs who are successful at reducing or closing the critical skills gap have the highest probability of minimizing the business impact of cyberattacks – even when budgets and staffing are constrained, according to the results of a new SANS Institute su… Continue reading Closing the skills gap can minimize the business impact of cyberattacks

SANS OnDemand Training: Expert guidance for building a home lab and testing environment

SANS Institute announces the best special offers of the year for SANS OnDemand Training, giving students the opportunity to choose a free device with their purchase of an OnDemand course. To help students make the most of this opportunity to get a new … Continue reading SANS OnDemand Training: Expert guidance for building a home lab and testing environment

SANS partners with Elevate Security to shift the industry paradigm to solve for the human element

SANS Institute announces partnership with Elevate Security, a human risk management platform nominated by RSA Conference as a top ten most innovative startup. SANS and Elevate Security are partnering to shift the industry paradigm to solve for the huma… Continue reading SANS partners with Elevate Security to shift the industry paradigm to solve for the human element

Design & Implementation of OEM ICS Cybersecurity Frameworks: The Good, The Bad, and The Ugly

The cyber threat landscape today continues to pose a myriad of unique challenges. This is especially the case for industrial organizations due to factors such as aging equipment, poor design or implementation, skills gaps and a lack of visibility. Thes… Continue reading Design & Implementation of OEM ICS Cybersecurity Frameworks: The Good, The Bad, and The Ugly

SANS@MIC Talk – Threat Hunting via DNS With Eric Conrad

Some of the finest threat hunting and security bits you’ll feast-thine-eyes-upon anywhere. Enjoy.
Permalink
The post SANS@MIC Talk – Threat Hunting via DNS With Eric Conrad appeared first on Security Boulevard.
Continue reading SANS@MIC Talk – Threat Hunting via DNS With Eric Conrad

Zeek & Sigma: Fully Compatible for Cross-SIEM Detections

By Alex Kirk, Corelight Global Principal for Suricata Corelight recently teamed up with SOC Prime, creators of advanced cyber analytics platforms, to add support for the entire Zeek data set into Sigma, the only generic signature language that enables … Continue reading Zeek & Sigma: Fully Compatible for Cross-SIEM Detections

Zeek & Sigma: Fully Compatible for Cross-SIEM Detections

By Alex Kirk, Corelight Global Principal for Suricata Corelight recently teamed up with SOC Prime, creators of advanced cyber analytics platforms, to add support for the entire Zeek data set into Sigma, the only generic signature language that enables … Continue reading Zeek & Sigma: Fully Compatible for Cross-SIEM Detections

How do I select a security awareness solution for my business?

“Great security awareness training, that is part of a healthy cyber security culture and that is aimed at encouraging positive security behaviours, is essential. The problem is that awareness-raising training has a history of being dry, dull, tec… Continue reading How do I select a security awareness solution for my business?

Chocolate and Peanut Butter, Zeek and Suricata

By Brian Dye, Chief Product Officer, Corelight Some things just go well together. A privilege of working with very sophisticated defenders in the open source community is seeing the design patterns they use to secure their organizations – bo… Continue reading Chocolate and Peanut Butter, Zeek and Suricata