Relieving Alert Fatigue With Personally Tailored Threat Intelligence

By tailoring threat intelligence to the specific concerns of the analysts consuming it, organizations can reduce alert fatigue and achieve higher levels of security maturity.

The post Relieving Alert Fatigue With Personally Tailored Threat Intelligence appeared first on Security Intelligence.

Continue reading Relieving Alert Fatigue With Personally Tailored Threat Intelligence

Security Analyst Summit 2018 in Cancun – AI, ML, And The Sun

Another year, another Security Analytics Summit. This year Kaspersky gathered an amazing set of speakers in Cancun, Mexico. I presented on AI & ML in Cyber Security – Why Algorithms Are Dangerous. I was really pleased how well the talk was re… Continue reading Security Analyst Summit 2018 in Cancun – AI, ML, And The Sun

A W-2 Nor’easter: Digging SOC Analysts Out From Under Tax Fraud False Positives

SOC analysts face blizzardlike conditions during tax season as false positives pile up and legitimate tax fraud alerts are liable to fly under the radar.

The post A W-2 Nor’easter: Digging SOC Analysts Out From Under Tax Fraud False Positives appeared first on Security Intelligence.

Continue reading A W-2 Nor’easter: Digging SOC Analysts Out From Under Tax Fraud False Positives

Security Intelligence at the Strategic, Operational and Tactical Levels

By optimizing intelligence at the strategic, operational and tactical levels, organizations can promote collaboration and bolster the incident response capabilities of their security teams.

The post Security Intelligence at the Strategic, Operational and Tactical Levels appeared first on Security Intelligence.

Continue reading Security Intelligence at the Strategic, Operational and Tactical Levels

How artificial intelligence stopped an Emotet outbreak

At 12:46 a.m. local time on February 3, a Windows 7 Pro customer in North Carolina became the first would-be victim of a new malware attack campaign for Trojan:Win32/Emotet. In the next 30 minutes, the campaign tried to attack over a thousand potential… Continue reading How artificial intelligence stopped an Emotet outbreak

All Cybersecurity Investments Are Not Created Equal

Instead of traditional endpoint security solutions, organizations should spring for cybersecurity investments that improve their ability to fend off serious, unknown threats, not just familiar ones.

The post All Cybersecurity Investments Are Not Created Equal appeared first on Security Intelligence.

Continue reading All Cybersecurity Investments Are Not Created Equal

A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017

Adopting reliable attack methods and techniques borrowed from more evolved threat types, ransomware attained new levels of reach and damage in 2017. The following trends characterize the ransomware narrative in the past year: Three global outbreaks sho… Continue reading A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017

A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017

Adopting reliable attack methods and techniques borrowed from more evolved threat types, ransomware attained new levels of reach and damage in 2017. The following trends characterize the ransomware narrative in the past year: Three global outbreaks sho… Continue reading A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017

Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy

For security leaders, the process of defining an SIEM strategy is never complete. A successful deployment requires careful planning, regular review and a culture of continuous improvement.

The post Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy appeared first on Security Intelligence.

Continue reading Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy

5 Security Big Data Challenges

Previously, I started blogging about individual topics and slides from my keynote at ACSAC 2017. The first topic I elaborated on a little bit was An Incomplete Security Big Data History. In this post I want to focus on the last slide in the presentatio… Continue reading 5 Security Big Data Challenges