Growing intrusion trends: A perspective on today’s most sophisticated cyberattacks

According to a new CrowdStrike report, the technology, professional services, and hospitality sectors were targeted most often by cyber adversaries. The actors used a variety of novel tactics, demonstrating particular creativity and perseverance in def… Continue reading Growing intrusion trends: A perspective on today’s most sophisticated cyberattacks

It only takes one data point to blow open a threat investigation

Because cybersecurity has been such a pain point for businesses, it’s easy to assume that threat investigations are difficult and unwieldy to manage. When you consider what’s at stake—customer data, sensitive company and client information, and the fin… Continue reading It only takes one data point to blow open a threat investigation

The state of network security in organizations with 1000+ employees

Security team size at the largest organizations does not scale with the number of overall employees, but they are more likely to include staff with specialized roles, say the results of the latest survey conducted by Osterman Research in partnership wi… Continue reading The state of network security in organizations with 1000+ employees

Following the Clues With DcyFS: A File System for Forensics

Decoy File System’s overlay layer is a forensic tool that helps security teams piece together what happens during a cyberattack and collect key evidence in the aftermath of a breach.

The post Following the Clues With DcyFS: A File System for Forensics appeared first on Security Intelligence.

Continue reading Following the Clues With DcyFS: A File System for Forensics

Threat Hunting in the Cloud, Apollo Clark – Paul’s Security Weekly #576

Apollo Clark goes through inventory management, access management, config management, patch management, automated remediation, logging and monitoring, and deployment tools. Full Show NotesVisit our website: http://securityweekly.com Follow us on Twitte… Continue reading Threat Hunting in the Cloud, Apollo Clark – Paul’s Security Weekly #576

Why humans are necessary to the threat hunting process

For thousands of years, humans have worked to collect intelligence on their enemies. Intelligence gathering is not a new practice; in fact, it is one of the oldest war tactics dating back to biblical times, when warlords and army commanders used it to … Continue reading Why humans are necessary to the threat hunting process

Tracking Security Innovation – Business Security Weekly #99

Michael Santarcangelo joined by special guest Ron Gula from Gula Tech Adventures, talk with Chris Brenton about how do you take someone with a basic level certification and give them access to the tool? Full Show Notes
The post Tracking Security Innova… Continue reading Tracking Security Innovation – Business Security Weekly #99

Chris Brenton, ACM – Business Security Weekly #99

Michael Santarcangelo returns! Michael is joined by Matt Alderman and Ron Gula to interview Chris Brenton. They discuss what is threat hunting, what does this actually mean, is there a level of maturity required (organization, security team, individual… Continue reading Chris Brenton, ACM – Business Security Weekly #99

Know Your Enemy: The Art and Science of Cyberthreat Hunting

By conducting regular and comprehensive cyberthreat hunting, organizations can stay one step ahead of malicious actors and soften the blow of a data breach.

The post Know Your Enemy: The Art and Science of Cyberthreat Hunting appeared first on Security Intelligence.

Continue reading Know Your Enemy: The Art and Science of Cyberthreat Hunting

Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative

Security teams can better prepare for cyberattacks by leveraging the different types of threat intelligence to inform decision-making at various levels of the enterprise.

The post Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative appeared first on Security Intelligence.

Continue reading Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative