Penetration Testing 101: What You Need to Know

On the digital battleground, enterprises need a way to make sure their defenses work. Penetration testing (or ‘pen testing’) offers the type of attack you might encounter, but in a controlled case. With pen testing, people intentionally attack an app or network to check on its security posture. This lets enterprises realistically test the effectiveness […]

The post Penetration Testing 101: What You Need to Know appeared first on Security Intelligence.

Continue reading Penetration Testing 101: What You Need to Know

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

It’s evident that while organizations are spending more and more on legacy cybersecurity solutions, these platforms are not holding up their end of the deal and are not able to proactively defend in a modern, non-signature attack threatscape.
The post … Continue reading The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

COVID-19 creates a boom in biometric adoption

Goode Intelligence published a survey which captured the views and opinions of companies that have deployed or are thinking of deploying biometrics. COVID-19 has accelerated the shift to digital, creating a boom in biometric adoption. Sixty-two percent… Continue reading COVID-19 creates a boom in biometric adoption

Remote work increasing the growth rate of the EDR market

Malware and virus attacks have increased substantially over the years. With the evolution of modern technologies, the threats associated with them have also increased. But on the brighter side, technology has advanced further to tackle an extensive ran… Continue reading Remote work increasing the growth rate of the EDR market

COVID-19-themed cyberattack detections continue to surge

McAfee released its new report, examining cybercriminal activity related to malware and the evolution of cyber threats in the third and fourth quarters of 2020. In Q4, there was an average of 648 threats per minute, an increase of 60 threats per minute… Continue reading COVID-19-themed cyberattack detections continue to surge

How AI in Cybersecurity Addresses Challenges Faced by Today’s SOC Analysts

Today’s security operations centers (SOC) have to manage data, tools and teams dispersed across the organization, making threat detection and teamwork difficult. There are many factors driving complex security work. Many people now work from home with coworkers in far-away places. The cost and maintenance of legacy tools and the migration to cloud also make […]

The post How AI in Cybersecurity Addresses Challenges Faced by Today’s SOC Analysts appeared first on Security Intelligence.

Continue reading How AI in Cybersecurity Addresses Challenges Faced by Today’s SOC Analysts

Combating Sleeper Threats With MTTD

During the SolarWinds Orion supply chain compromise, threat actors lurked in the victim’s network for more than a year. Discovered by FireEye in December 2020, the earliest traces of a modified SolarWinds Orion go back as early as October 2019. Although these early versions did not contain the malicious backdoor (this was added in March […]

The post Combating Sleeper Threats With MTTD appeared first on Security Intelligence.

Continue reading Combating Sleeper Threats With MTTD

XDR and MDR: What’s the difference and why does it matter?

The cybersecurity industry loves acronyms and XDR is rising swiftly to the top of the charts of the current lexicon. Extended detection and response (XDR) is a designation used when you do not have the ability to cover a wide range of threat vectors. S… Continue reading XDR and MDR: What’s the difference and why does it matter?