Will vacancies create security voids?

Automation may be shortening the Mean Time to Response (MTTR) when it comes to detecting and responding to attacks, but there is still no substitute for the human in the kill chain. Playbooks need to be constructed by security professionals, triggers i… Continue reading Will vacancies create security voids?

How to build a security tool that sells

In my experience as a CISO in the industry, as well as in my current position as CISO-in-Residence at YL Ventures, an early-stage, cybersecurity-focused venture capital firm, I have been fortunate to provide founders with guidance and insights into the… Continue reading How to build a security tool that sells

Behavior-based vs IOC-based Threat Detection Approaches: How to Prioritize?

By Waqas
A core cybersecurity procedure usually includes running detection rules based on the Indicators of Compromise (IOCs). However, the…
This is a post from HackRead.com Read the original post: Behavior-based vs IOC-based Threat Detection App… Continue reading Behavior-based vs IOC-based Threat Detection Approaches: How to Prioritize?

Organizations taking nearly two months to remediate critical risk vulnerabilities

Edgescan announces the findings of a report which offers a comprehensive view of the state of vulnerability management globally. This year’s report takes a more granular look at the trends by industry, and provides details on which of the known, … Continue reading Organizations taking nearly two months to remediate critical risk vulnerabilities

Fraud detection and prevention costs merchants more than fraud itself

European merchants spent nearly €7 billion on fraud detection and prevention in 2021 alone – more than three times the value lost to fraud in the same year, CMSPI estimates. These practices are unsustainable for the continent’s merchants, who are curre… Continue reading Fraud detection and prevention costs merchants more than fraud itself

Google announces threat detection for virtual machines in its cloud

Google is adding a new defensive layer to protect enterprise workloads running in Google Cloud. It’s called Virtual Machine Threat Detection (VMTD), and will help select Security Command Center customers detect cryptomining malware inside their v… Continue reading Google announces threat detection for virtual machines in its cloud

Intelligent Adversary Engagement: Deceiving the Attacker

Traditional security isn’t always enough to keep attackers at bay. When it comes to sneaking into networks, detection will often only come after malicious traffic reaches systems such as next-generation firewalls and intrusion detection and prevention systems. Meanwhile, threat actors have free range. But if you can trick the attacker attempting to trick you, it’s […]

The post Intelligent Adversary Engagement: Deceiving the Attacker appeared first on Security Intelligence.

Continue reading Intelligent Adversary Engagement: Deceiving the Attacker

Security leaders need more data and context to conduct cloud investigations

89% of companies have experienced a negative outcome in the time between detection and investigation of a cyber-attack on their cloud environments, an ESG research reveals. The research further revealed that it takes an average of 3.1 days to begin an … Continue reading Security leaders need more data and context to conduct cloud investigations

Taking Threat Detection and Response to the Next Level with Open XDR

The challenges facing today’s security industry can easily be described as a perfect storm: increasingly sophisticated cyber attackers combined with the proliferation of security tools to cover an expanding attack surface driven by remote work and cloud adoption. These dynamics can lead to disconnected insights and data, putting even more pressure on the existing shortage […]

The post Taking Threat Detection and Response to the Next Level with Open XDR appeared first on Security Intelligence.

Continue reading Taking Threat Detection and Response to the Next Level with Open XDR