Detecting malicious behavior blended with business-justified activity

With organizations moving to the cloud and remote workers becoming the rule rather than the exception, the definition of the network is changing. Add to this the increasing use of IoT devices, encryption and engagement in shadow IT practices, and it&#8… Continue reading Detecting malicious behavior blended with business-justified activity

Organizations want to threat hunt, but can’t due to lack of time, skills and visibility

As cybercriminals and nation-states continue to improve the sophistication of attacks that bypass traditional preventive defenses, organizations must evolve their security defenses to reduce dwell time. Fidelis Cybersecurity asked cybersecurity leaders… Continue reading Organizations want to threat hunt, but can’t due to lack of time, skills and visibility

Visit the Subway System of Cybercrime With Security Consultant Francisco Galian

The battle stories Francisco Galian heard as a student inspired him to protect multinational networks as a security consultant. He’s parachuted in when times get critical for IBM Security customers.

The post Visit the Subway System of Cybercrime With Security Consultant Francisco Galian appeared first on Security Intelligence.

Continue reading Visit the Subway System of Cybercrime With Security Consultant Francisco Galian

Growing intrusion trends: A perspective on today’s most sophisticated cyberattacks

According to a new CrowdStrike report, the technology, professional services, and hospitality sectors were targeted most often by cyber adversaries. The actors used a variety of novel tactics, demonstrating particular creativity and perseverance in def… Continue reading Growing intrusion trends: A perspective on today’s most sophisticated cyberattacks

It only takes one data point to blow open a threat investigation

Because cybersecurity has been such a pain point for businesses, it’s easy to assume that threat investigations are difficult and unwieldy to manage. When you consider what’s at stake—customer data, sensitive company and client information, and the fin… Continue reading It only takes one data point to blow open a threat investigation

The state of network security in organizations with 1000+ employees

Security team size at the largest organizations does not scale with the number of overall employees, but they are more likely to include staff with specialized roles, say the results of the latest survey conducted by Osterman Research in partnership wi… Continue reading The state of network security in organizations with 1000+ employees

Following the Clues With DcyFS: A File System for Forensics

Decoy File System’s overlay layer is a forensic tool that helps security teams piece together what happens during a cyberattack and collect key evidence in the aftermath of a breach.

The post Following the Clues With DcyFS: A File System for Forensics appeared first on Security Intelligence.

Continue reading Following the Clues With DcyFS: A File System for Forensics

Threat Hunting in the Cloud, Apollo Clark – Paul’s Security Weekly #576

Apollo Clark goes through inventory management, access management, config management, patch management, automated remediation, logging and monitoring, and deployment tools. Full Show NotesVisit our website: http://securityweekly.com Follow us on Twitte… Continue reading Threat Hunting in the Cloud, Apollo Clark – Paul’s Security Weekly #576