Why humans are necessary to the threat hunting process

For thousands of years, humans have worked to collect intelligence on their enemies. Intelligence gathering is not a new practice; in fact, it is one of the oldest war tactics dating back to biblical times, when warlords and army commanders used it to … Continue reading Why humans are necessary to the threat hunting process

Tracking Security Innovation – Business Security Weekly #99

Michael Santarcangelo joined by special guest Ron Gula from Gula Tech Adventures, talk with Chris Brenton about how do you take someone with a basic level certification and give them access to the tool? Full Show Notes
The post Tracking Security Innova… Continue reading Tracking Security Innovation – Business Security Weekly #99

Chris Brenton, ACM – Business Security Weekly #99

Michael Santarcangelo returns! Michael is joined by Matt Alderman and Ron Gula to interview Chris Brenton. They discuss what is threat hunting, what does this actually mean, is there a level of maturity required (organization, security team, individual… Continue reading Chris Brenton, ACM – Business Security Weekly #99

Know Your Enemy: The Art and Science of Cyberthreat Hunting

By conducting regular and comprehensive cyberthreat hunting, organizations can stay one step ahead of malicious actors and soften the blow of a data breach.

The post Know Your Enemy: The Art and Science of Cyberthreat Hunting appeared first on Security Intelligence.

Continue reading Know Your Enemy: The Art and Science of Cyberthreat Hunting

Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative

Security teams can better prepare for cyberattacks by leveraging the different types of threat intelligence to inform decision-making at various levels of the enterprise.

The post Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative appeared first on Security Intelligence.

Continue reading Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative

A Beginner’s Guide to Threat Hunting

Threat hunting is a complex and labor-intensive task, but it can go a long way toward helping your organization detect APTs before they can cause damage to the network.

The post A Beginner’s Guide to Threat Hunting appeared first on Security Intelligence.

Continue reading A Beginner’s Guide to Threat Hunting

Beacon Analysis, Chris Brenton – Paul’s Security Weekly #574

Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I’ll talk about what makes beacon… Continue reading Beacon Analysis, Chris Brenton – Paul’s Security Weekly #574

Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment

Security ecosystems and threat hunting techniques have evolved since the introduction of SIEM more than 15 years ago. Is your security intelligence strategy up to date?

The post Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment appeared first on Security Intelligence.

Continue reading Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment

BSides Cleveland 2018, Jamie Murdock’s ‘The Marriage Of Threat Intelligence And Incident Response Or… Threat Hunting For The Rest of Us’

Videography Credit: Irongeek (Adrian Crenshaw).
Permalink
The post BSides Cleveland 2018, Jamie Murdock’s ‘The Marriage Of Threat Intelligence And Incident Response Or… Threat Hunting For The Rest of Us’ appeared first on Secu… Continue reading BSides Cleveland 2018, Jamie Murdock’s ‘The Marriage Of Threat Intelligence And Incident Response Or… Threat Hunting For The Rest of Us’