Automation, visibility remain biggest issues for cybersecurity teams

Organizations still do not have necessary levels of automation or visibility within their cyber terrain, especially as security stacks grow and are underutilized, Fidelis Cybersecurity’s annual State of Threat Detection Report has shown. Without … Continue reading Automation, visibility remain biggest issues for cybersecurity teams

Package Delivery! Cybercriminals at Your Doorstep

Reading Time: 6 minutes IBM X-Force Red investigated how cybercriminals might seek to exploit package deliveries to hack into corporate or personal home networks right from the office mailroom or from someone’s front door.

The post Package Delivery! Cybercriminals at Your Doorstep appeared first on Security Intelligence.

Continue reading Package Delivery! Cybercriminals at Your Doorstep

From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise

Reading Time: 4 minutes Destructive attacks have been on the rise, posing a growing threat to a wide variety of businesses who may not consider themselves an obvious target of cybercriminals.

The post From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise appeared first on Security Intelligence.

Continue reading From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise

Threat Hunting and Its Importance

Threat hunting isn’t new, but the importance of its practical use in countering cyberthreats is recent. We’ve seen that companies’ awareness of threat hunting is increasing over time. However, a lack of attention given to cyberthreats—whether due to b… Continue reading Threat Hunting and Its Importance

How effective is your security operations center?

While the SOC is considered an essential or important component of business, most security professionals rate their SOC’s effectiveness as low, and 49 percent say it is not fully aligned with business needs, according to a survey conducted by Devo Tech… Continue reading How effective is your security operations center?

Threat Intelligence Is the SOC’s Road Map to DNS Security

Threat intelligence provides the context SOC analysts need to proactively identify DNS security threats and prevent future DNS attacks.

The post Threat Intelligence Is the SOC’s Road Map to DNS Security appeared first on Security Intelligence.

Continue reading Threat Intelligence Is the SOC’s Road Map to DNS Security

Threat Hunting – Enterprise Security Weekly #144

    John Strand and Matt Alderman will discuss Threat Hunting. Full Show Notes Visit https://securityweekly.com/esw for all the latest episodes! Hosts Announcements Register for our upcoming webcasts with Viavi & ISC2 by going to securityweekly.com… Continue reading Threat Hunting – Enterprise Security Weekly #144

Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale

The law of large numbers theorem facilitates threat hunting at scale on large networks because it isolates unusual activity and network anomalies.
The post Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale appeared first on Se… Continue reading Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale