Need a Sounding Board for Your Incident Response Plan? Join a Security Community

Joining a security community is a great way to get advice and feedback on your incident response plan from like-minded peers.

The post Need a Sounding Board for Your Incident Response Plan? Join a Security Community appeared first on Security Intelligence.

Continue reading Need a Sounding Board for Your Incident Response Plan? Join a Security Community

SIEM Event Normalization Makes Raw Data Relevant to Both Humans and Machines

In its raw form, log data is almost impossible for a human to process, so advanced SIEM solutions conduct a process called event normalization to deliver a homogeneous view.

The post SIEM Event Normalization Makes Raw Data Relevant to Both Humans and Machines appeared first on Security Intelligence.

Continue reading SIEM Event Normalization Makes Raw Data Relevant to Both Humans and Machines

Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers

Reuters recently reported a hacking campaign focused on a wide range of targets across the globe. In the days leading to the Reuters publication, Microsoft researchers were closely tracking the same campaign. Our sensors revealed that the campaign prim… Continue reading Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers

Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative

Security teams can better prepare for cyberattacks by leveraging the different types of threat intelligence to inform decision-making at various levels of the enterprise.

The post Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative appeared first on Security Intelligence.

Continue reading Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative

A Beginner’s Guide to Threat Hunting

Threat hunting is a complex and labor-intensive task, but it can go a long way toward helping your organization detect APTs before they can cause damage to the network.

The post A Beginner’s Guide to Threat Hunting appeared first on Security Intelligence.

Continue reading A Beginner’s Guide to Threat Hunting

Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment

Security ecosystems and threat hunting techniques have evolved since the introduction of SIEM more than 15 years ago. Is your security intelligence strategy up to date?

The post Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment appeared first on Security Intelligence.

Continue reading Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment

Small businesses targeted by highly localized Ursnif campaign

Cyber thieves are continuously looking for new ways to get people to click on a bad link, open a malicious file, or install a poisoned update in order to steal valuable data. In the past, they cast as wide a net as possible to increase the pool of pote… Continue reading Small businesses targeted by highly localized Ursnif campaign

Building the security operations center of tomorrow—harnessing the law of data gravity

How can we build the SOC of tomorrow? By respecting the law of data gravity. If we can perform security analytics close to where the data already is, we can increase the speed of response.
The post Building the security operations center of tomorrow—ha… Continue reading Building the security operations center of tomorrow—harnessing the law of data gravity

3 Key Areas of Security Operations to Benchmark and Evaluate

SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow.

The post 3 Key Areas of Security Operations to Benchmark and Evaluate appeared first on Security Intelligence.

Continue reading 3 Key Areas of Security Operations to Benchmark and Evaluate

Know Your Enemy: How to Build a Successful Threat Hunting Program

To build a successful threat hunting program, you must thoroughly understand who might attack your organization, what these malicious actors might be after and what tactics they’ll use to get it.

The post Know Your Enemy: How to Build a Successful Threat Hunting Program appeared first on Security Intelligence.

Continue reading Know Your Enemy: How to Build a Successful Threat Hunting Program