How to Mitigate Risk Against Operational Technology (OT)

Operational technology, or OT, is hardware and software technologies that monitor and control a variety of physical operations including, but not limited to processes, devices, and even various infrastructures like public rail transportation. As OT bec… Continue reading How to Mitigate Risk Against Operational Technology (OT)

Guidance to help cyber threat intelligence analysts apply MITRE ATT&CK

CISA has partnered with the Homeland Security Systems Engineering and Development Institute (HSSEDI), which worked with the MITRE ATT&CK team, to issue guidance to help cyber threat intelligence analysts make better use of MITRE ATT&CK. MITRE… Continue reading Guidance to help cyber threat intelligence analysts apply MITRE ATT&CK

Upcoming Discussion: A Risk-Based Approach to Bridging the Energy Sector Security Gap

Wednesday June 30, 2021 11 AM PST / 2 PM EST NERC has recently partnered with the Department of Energy (DOE) to expand the Cybersecurity Risk Information Sharing Program (CRISP) to include operational technology. The program is aimed at protecting the … Continue reading Upcoming Discussion: A Risk-Based Approach to Bridging the Energy Sector Security Gap

Best Practices for Communicating SecOps to the Board

SecOps is a combined super-team of cybersecurity professionals from both Security and IT Operations sectors, thus, the conjunction of Security and Operations to form SecOps. SecOps teams are responsible for a wide range of cybersecurity management acti… Continue reading Best Practices for Communicating SecOps to the Board

How to Improve Your Security Incident Response with Automation

Automation can drastically improve the way your organization handles incident response. The growing volume of threat alerts is overwhelming the ability of security operations teams to keep pace. In fact, 93% of organizations report that they are unable… Continue reading How to Improve Your Security Incident Response with Automation

How Cloud Defenders Thwart Attacks Against Resilient Services

The introduction of containers and micro-service architectures have changed the way we develop, deploy, and run our applications.  Not only has this changed application development, but it’s also created some visibility challenges for application secu… Continue reading How Cloud Defenders Thwart Attacks Against Resilient Services

Anton’s Security Blog Quarterly Q1 2021

Sometimes great old blog posts are hard to find (especially on Medium…), so I decided to do a periodic list blog with my favorite posts of the past quarter or so.
Here is my second. The posts below are ranked by lifetime views and topic. It covers both… Continue reading Anton’s Security Blog Quarterly Q1 2021

Challenges and benefits of using threat data feeds

Threat data feeds can help organizations strengthen their cybersecurity posture, according to a report from the Ponemon Institute. As cyberthreats proliferate, many organizations are using threat feeds with insights from domain name system (DNS) data t… Continue reading Challenges and benefits of using threat data feeds

Rapid increase in security tools causing alert fatigue and burn out

On average, enterprises maintain 19 different security tools, with only 22% of such tools serving as vital to primary security objectives, a ReliaQuest survey reveals. The report, which surveyed 400 IT and security decision makers at companies with mor… Continue reading Rapid increase in security tools causing alert fatigue and burn out

Alert overload still plagues cybersecurity industry

Alert overload still plagues the cybersecurity industry, according to Critical Start. Forty-seven percent of respondents reported personally investigating 10 to 20 alerts each day, a 12% increase from 2019. Moreover, 25% of respondents said they invest… Continue reading Alert overload still plagues cybersecurity industry