Are your cyber defenses stuck in the sandbox?

Installing a network sandbox to safeguard against external threats has been accepted by many as the gold standard for more than a decade. Sandbox-based cybersecurity solutions are a protected and isolated environment on a network that simulates a compa… Continue reading Are your cyber defenses stuck in the sandbox?

Improving Threat Detection Using LogRhythm SmartResponse with Lists to Monitor IOCs

As a security professional, you know all too well the need to continually improve your threat detection knowledge and skill set. With today’s expanding attack surface and hackers becoming more sophisticated in their infiltration methods, building a str… Continue reading Improving Threat Detection Using LogRhythm SmartResponse with Lists to Monitor IOCs

The most important point in a cyberattack is the moment before it happens

Let’s get the scary thing out of the way: more than half of businesses have dealt with a serious security breach in the last two years. The chances of one happening are so high that organizations need to plan for a breach. The good news, though, is the… Continue reading The most important point in a cyberattack is the moment before it happens

New Video: MixMode Cyber Anomaly Detection Platform

We recently released a new video to better explain how MixMode’s next-generation cybersecurity anomaly detection platform combines the functionality of SIEM, NDR, NTA and UEBA for advanced threat detection, zero day attack identification, false positiv… Continue reading New Video: MixMode Cyber Anomaly Detection Platform

Penetration Testing 101: What You Need to Know

On the digital battleground, enterprises need a way to make sure their defenses work. Penetration testing (or ‘pen testing’) offers the type of attack you might encounter, but in a controlled case. With pen testing, people intentionally attack an app or network to check on its security posture. This lets enterprises realistically test the effectiveness […]

The post Penetration Testing 101: What You Need to Know appeared first on Security Intelligence.

Continue reading Penetration Testing 101: What You Need to Know

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

It’s evident that while organizations are spending more and more on legacy cybersecurity solutions, these platforms are not holding up their end of the deal and are not able to proactively defend in a modern, non-signature attack threatscape.
The post … Continue reading The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

COVID-19 creates a boom in biometric adoption

Goode Intelligence published a survey which captured the views and opinions of companies that have deployed or are thinking of deploying biometrics. COVID-19 has accelerated the shift to digital, creating a boom in biometric adoption. Sixty-two percent… Continue reading COVID-19 creates a boom in biometric adoption

Remote work increasing the growth rate of the EDR market

Malware and virus attacks have increased substantially over the years. With the evolution of modern technologies, the threats associated with them have also increased. But on the brighter side, technology has advanced further to tackle an extensive ran… Continue reading Remote work increasing the growth rate of the EDR market