Following the Clues With DcyFS: A File System for Forensics

Decoy File System’s overlay layer is a forensic tool that helps security teams piece together what happens during a cyberattack and collect key evidence in the aftermath of a breach.

The post Following the Clues With DcyFS: A File System for Forensics appeared first on Security Intelligence.

Continue reading Following the Clues With DcyFS: A File System for Forensics

Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative

Security teams can better prepare for cyberattacks by leveraging the different types of threat intelligence to inform decision-making at various levels of the enterprise.

The post Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative appeared first on Security Intelligence.

Continue reading Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative

It’s Time to Adopt AI in Your Security Operations Center

If your security operations center (SOC) team is overwhelmed when it comes to cybersecurity, it’s time to consider AI to automate your time-consuming tasks.

The post It’s Time to Adopt AI in Your Security Operations Center appeared first on Security Intelligence.

Continue reading It’s Time to Adopt AI in Your Security Operations Center

Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment

Security ecosystems and threat hunting techniques have evolved since the introduction of SIEM more than 15 years ago. Is your security intelligence strategy up to date?

The post Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment appeared first on Security Intelligence.

Continue reading Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment

3 Key Areas of Security Operations to Benchmark and Evaluate

SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow.

The post 3 Key Areas of Security Operations to Benchmark and Evaluate appeared first on Security Intelligence.

Continue reading 3 Key Areas of Security Operations to Benchmark and Evaluate

Don’t Risk It: Why You Shouldn’t Assume All Cybersecurity Solutions Are Based on Standards

There is no governing board or standard for cybersecurity solutions, so you can’t assume all products of a given type are either equal or interchangeable.

The post Don’t Risk It: Why You Shouldn’t Assume All Cybersecurity Solutions Are Based on Standards appeared first on Security Intelligence.

Continue reading Don’t Risk It: Why You Shouldn’t Assume All Cybersecurity Solutions Are Based on Standards

Why You Need Full Visibility to Manage Common Vulnerabilities and Exposures (CVE)

The volume of CVE data is rapidly growing, and security teams need continuous visibility into their assets and associated risks to stay on top of emerging threats.

The post Why You Need Full Visibility to Manage Common Vulnerabilities and Exposures (CVE) appeared first on Security Intelligence.

Continue reading Why You Need Full Visibility to Manage Common Vulnerabilities and Exposures (CVE)

What’s In a (Threat Intelligence) Name?

A lot of things in the threat intelligence world have multiple names, and these aliases often complicate the process of researching and dealing with security threats.

The post What’s In a (Threat Intelligence) Name? appeared first on Security Intelligence.

Continue reading What’s In a (Threat Intelligence) Name?

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4

Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4

Become a JSON Formatter — and Kick Your Security Integrations Into Action

Becoming a JSON formatter, and packing up your data in a new way, can reduce or eliminate the need for custom work and save your security team precious time.

The post Become a JSON Formatter — and Kick Your Security Integrations Into Action appeared first on Security Intelligence.

Continue reading Become a JSON Formatter — and Kick Your Security Integrations Into Action