7 threat detection challenges CISOs face and what they can do about it

Security operations (SecOps) teams continue to be under a constant deluge of new attacks and malware variants. In fact, according to recent research, there were over 170 million new malware variants in 2021 alone. As a result, the burden on CISOs and t… Continue reading 7 threat detection challenges CISOs face and what they can do about it

Top 5 security analytics to measure

You don’t need a Ph.D. in cybersecurity to recognize the importance of security analytics. Security analytics uses data analysis – often aided by machine learning – to detect security threats and measure the effectiveness of security operations. … Continue reading Top 5 security analytics to measure

New threat groups and malware families emerging

Mandiant announced the findings of an annual report that provides timely data and insights based on frontline investigations and remediations of high-impact cyber attacks worldwide. The 2022 report––which tracks investigation metrics between October 1,… Continue reading New threat groups and malware families emerging

CrowdStrike, Mandiant announce ‘strategic partnership’

CrowdStrike’s Falcon platform will be integrated into Mandiant’s services for existing customers. More crossover is planned later this year.

The post CrowdStrike, Mandiant announce ‘strategic partnership’ appeared first on CyberScoop.

Continue reading CrowdStrike, Mandiant announce ‘strategic partnership’

Why EDR is not sufficient to protect your organization

Endpoint detection and response (EDR) tools are a cornerstone of most cybersecurity defenses today. But while the technology has an important role to play in investigating threats, too many organizations have made the mistake of relying on EDR as their… Continue reading Why EDR is not sufficient to protect your organization

Will vacancies create security voids?

Automation may be shortening the Mean Time to Response (MTTR) when it comes to detecting and responding to attacks, but there is still no substitute for the human in the kill chain. Playbooks need to be constructed by security professionals, triggers i… Continue reading Will vacancies create security voids?

How to build a security tool that sells

In my experience as a CISO in the industry, as well as in my current position as CISO-in-Residence at YL Ventures, an early-stage, cybersecurity-focused venture capital firm, I have been fortunate to provide founders with guidance and insights into the… Continue reading How to build a security tool that sells

Behavior-based vs IOC-based Threat Detection Approaches: How to Prioritize?

By Waqas
A core cybersecurity procedure usually includes running detection rules based on the Indicators of Compromise (IOCs). However, the…
This is a post from HackRead.com Read the original post: Behavior-based vs IOC-based Threat Detection App… Continue reading Behavior-based vs IOC-based Threat Detection Approaches: How to Prioritize?

Organizations taking nearly two months to remediate critical risk vulnerabilities

Edgescan announces the findings of a report which offers a comprehensive view of the state of vulnerability management globally. This year’s report takes a more granular look at the trends by industry, and provides details on which of the known, … Continue reading Organizations taking nearly two months to remediate critical risk vulnerabilities

Fraud detection and prevention costs merchants more than fraud itself

European merchants spent nearly €7 billion on fraud detection and prevention in 2021 alone – more than three times the value lost to fraud in the same year, CMSPI estimates. These practices are unsustainable for the continent’s merchants, who are curre… Continue reading Fraud detection and prevention costs merchants more than fraud itself