A Beginner’s Guide to Threat Hunting

Threat hunting is a complex and labor-intensive task, but it can go a long way toward helping your organization detect APTs before they can cause damage to the network.

The post A Beginner’s Guide to Threat Hunting appeared first on Security Intelligence.

Continue reading A Beginner’s Guide to Threat Hunting

Beacon Analysis, Chris Brenton – Paul’s Security Weekly #574

Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I’ll talk about what makes beacon… Continue reading Beacon Analysis, Chris Brenton – Paul’s Security Weekly #574

Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment

Security ecosystems and threat hunting techniques have evolved since the introduction of SIEM more than 15 years ago. Is your security intelligence strategy up to date?

The post Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment appeared first on Security Intelligence.

Continue reading Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment

BSides Cleveland 2018, Jamie Murdock’s ‘The Marriage Of Threat Intelligence And Incident Response Or… Threat Hunting For The Rest of Us’

Videography Credit: Irongeek (Adrian Crenshaw).
Permalink
The post BSides Cleveland 2018, Jamie Murdock’s ‘The Marriage Of Threat Intelligence And Incident Response Or… Threat Hunting For The Rest of Us’ appeared first on Secu… Continue reading BSides Cleveland 2018, Jamie Murdock’s ‘The Marriage Of Threat Intelligence And Incident Response Or… Threat Hunting For The Rest of Us’

How to Leverage Log Services to Analyze C&C Traffic

Security teams can generate valuable insights about ongoing attacks by using log services and threat intelligence to analyze C&C traffic.

The post How to Leverage Log Services to Analyze C&C Traffic appeared first on Security Intelligence.

Continue reading How to Leverage Log Services to Analyze C&C Traffic

Know Your Enemy: How to Build a Successful Threat Hunting Program

To build a successful threat hunting program, you must thoroughly understand who might attack your organization, what these malicious actors might be after and what tactics they’ll use to get it.

The post Know Your Enemy: How to Build a Successful Threat Hunting Program appeared first on Security Intelligence.

Continue reading Know Your Enemy: How to Build a Successful Threat Hunting Program

IBM Veteran Training: Service Members Shine in Cyber Crisis Management Training

As the cybersecurity industry is challenged with a growing skills gap, IBM and CASY are offering cybersecurity training for veterans through the Veterans Accelerator program.

The post IBM Veteran Training: Service Members Shine in Cyber Crisis Management Training appeared first on Security Intelligence.

Continue reading IBM Veteran Training: Service Members Shine in Cyber Crisis Management Training