Security Analyst Files Workman’s Comp Claim for ‘Seriously Fatigued Fingers’

A level 3 security analyst announced he’ll be taking a six-month leave due to “seriously fatigued fingers” and “a wonky eye” resulting from his daily activities to ensure data security and compliance.

The post Security Analyst Files Workman’s Comp Claim for ‘Seriously Fatigued Fingers’ appeared first on Security Intelligence.

Continue reading Security Analyst Files Workman’s Comp Claim for ‘Seriously Fatigued Fingers’

Threat Hunting & AI Hunter, ACM – Paul’s Security Weekly #599

In the Technical Segment, we welcome back our friend Chris Brenton, Chief Operating Officer at Active Countermeasures, to discuss why threat hunting is the missing link between our protection tools and our response tools, and will take a deep dive into… Continue reading Threat Hunting & AI Hunter, ACM – Paul’s Security Weekly #599

Hunting for the True Meaning of Threat Hunting at RSAC 2019

Many vendors at RSAC 2019 boasted of their advanced and even automated threat hunting capabilities, but it’s important to understand the difference between true threat hunting and marketing jargon.

The post Hunting for the True Meaning of Threat Hunting at RSAC 2019 appeared first on Security Intelligence.

Continue reading Hunting for the True Meaning of Threat Hunting at RSAC 2019

Don’t Be Trapped – Close Cybersecurity Holes

Take a glance at the most discussed cybersecurity news of the week. Learn about the …
The post Don’t Be Trapped – Close Cybersecurity Holes appeared first on EdGuards – Security for Education.
The post Don’t Be Trapped – Close Cybersecuri… Continue reading Don’t Be Trapped – Close Cybersecurity Holes

It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare

Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus.

The post It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare appeared first on Security Intelligence.

Continue reading It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare

Embrace the Intelligence Cycle to Secure Your Business

Whether you’re protecting data, financial assets or even people, the intelligence cycle can help you gather data and contextualize it in terms of what you already know and what you hope to learn.

The post Embrace the Intelligence Cycle to Secure Your Business appeared first on Security Intelligence.

Continue reading Embrace the Intelligence Cycle to Secure Your Business

Maturing Your Security Operations Center With the Art and Science of Threat Hunting

By combining repeatable processes for threat hunting with intelligent solutions and skilled analysts, organizations can improve threat response and protect their most critical assets.

The post Maturing Your Security Operations Center With the Art and Science of Threat Hunting appeared first on Security Intelligence.

Continue reading Maturing Your Security Operations Center With the Art and Science of Threat Hunting

Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Every week we publish a blog post where we dive into a topic or study around network security. In 2018, we even produced…
The post Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018 appeared first o… Continue reading Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

The Cyber Attribution Dilemma: 3 Barriers to Cyber Deterrence

The concept of mutually assured destruction (MAD) has historically prevented nuclear war, but threat actors’ advanced obfuscation techniques have made cyber deterrence difficult if not impossible.

The post The Cyber Attribution Dilemma: 3 Barriers to Cyber Deterrence appeared first on Security Intelligence.

Continue reading The Cyber Attribution Dilemma: 3 Barriers to Cyber Deterrence

More Than Just a Fad: Lessons Learned About Threat Hunting in 2018

One cybersecurity capability that continues to prove it’s here to stay is threat hunting, a proactive approach to discovering and mitigating threats.

The post More Than Just a Fad: Lessons Learned About Threat Hunting in 2018 appeared first on Security Intelligence.

Continue reading More Than Just a Fad: Lessons Learned About Threat Hunting in 2018