Cyber threats continue to evolve, but security teams remain confident

Coming off of a year of major data breaches making headline news, it’s easy to draw the conclusion that security teams are losing the cybersecurity battle, a DomainTools survey reveals. Security teams remain confident Security pros are reporting real p… Continue reading Cyber threats continue to evolve, but security teams remain confident

How Old-School Hackers Are Enabling the Next Generation of Offensive Security Professionals

Despite hackers’ successes, we’re still being mistaken for criminals in hoodies — a misconception that has helped keep the skills gap, especially when it comes to offensive security, as wide as ever.

The post How Old-School Hackers Are Enabling the Next Generation of Offensive Security Professionals appeared first on Security Intelligence.

Continue reading How Old-School Hackers Are Enabling the Next Generation of Offensive Security Professionals

Investigating Threat Alerts with Osquery: Understanding Threat Surface & Risk

The Uptycs Threat Intelligence team is responsible for providing a high quality, curated, and current Threat Intelligence feed to the Uptycs product. In order to deliver the threat feed, the team evaluates every single alert that is seen by our cu… Continue reading Investigating Threat Alerts with Osquery: Understanding Threat Surface & Risk

Threat Hunting Strategies for 2020

Cyber attacks are becoming more advanced with each year, as indicated by the increase in data breaches. According to a Risk-Based Security report, 2019 might break a new record, with more than 3,800 breaches, and still counting.  Threat hunting ai… Continue reading Threat Hunting Strategies for 2020

How Mature is Your Security Automation? See the Survey Results and How You Compare.

We hear a lot about security orchestration, automation, and response.  It will help us with our security skills gap.  It will improve our operational efficiency, thus reducing mean time to detect and respond to incidents.  It will give us more time for… Continue reading How Mature is Your Security Automation? See the Survey Results and How You Compare.

Security Supply and Demand: An Economic Approach to Cybersecurity Risk Management

Effective cybersecurity risk management boosts infosec supply and reduces cost demands, but it isn’t a purely technological venture. Here’s how economic theory can help reduce total risk.

The post Security Supply and Demand: An Economic Approach to Cybersecurity Risk Management appeared first on Security Intelligence.

Continue reading Security Supply and Demand: An Economic Approach to Cybersecurity Risk Management

Keep Adversaries at Bay With the MITRE ATT&CK Framework

Organizations are adopting the MITRE ATT&CK framework to map their cybersecurity threat detection, prevention and response capabilities to attack scenarios.

The post Keep Adversaries at Bay With the MITRE ATT&CK Framework appeared first on Security Intelligence.

Continue reading Keep Adversaries at Bay With the MITRE ATT&CK Framework

The Day MegaCortex Ransomware Mayhem Was Averted

IBM X-Force IRIS investigated a recent MegaCortex ransomware attack that highlights the benefits of reporting early and escalating suspicious indicators to responders.

The post The Day MegaCortex Ransomware Mayhem Was Averted appeared first on Security Intelligence.

Continue reading The Day MegaCortex Ransomware Mayhem Was Averted

Why Cities Shouldn’t Pay Ransomware Criminals

Recent ransomware attacks on U.S. cities have revealed the exorbitant cost of recovering from a data breach. However, paying the ransom only empowers cybercriminals to continue their campaigns.

The post Why Cities Shouldn’t Pay Ransomware Criminals appeared first on Security Intelligence.

Continue reading Why Cities Shouldn’t Pay Ransomware Criminals