Is Windows ShimCache a threat hunting goldmine?

Enterprise-wide threat hunting sounds like a daunting task and for inexperienced forensic analysts it certainly can be. However, there are various techniques that can be used to provide the most bang for your buck and start producing results quickly. T… Continue reading Is Windows ShimCache a threat hunting goldmine?

On the Hunt: Neutralize Malicious Actors With Proactive Threat Hunting

Threat hunting enables security teams to shift from simply responding to attacks to proactively identifying and mitigating threats before they hit enterprise networks.

The post On the Hunt: Neutralize Malicious Actors With Proactive Threat Hunting appeared first on Security Intelligence.

Continue reading On the Hunt: Neutralize Malicious Actors With Proactive Threat Hunting

A New Paradigm For Cyber Threat Hunting

It’s no secret that expecting security controls to block every infection vector is unrealistic. For most organizations, the chances are very high that threats have already penetrated their defenses and are lurking in their network.

Pinpointing such th… Continue reading A New Paradigm For Cyber Threat Hunting

DHS, FBI warn about malware tied to North Korean threat actor

US-CERT has released a new technical alert on malware used by Hidden Cobra, a threat actor whose activities they believe to be directed by the North Korean government. The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (F… Continue reading DHS, FBI warn about malware tied to North Korean threat actor

Ready to Try Threat Modeling? Avoid These 4 Common Missteps

Avoid these common threat-modeling missteps. Threat modeling can help you identify and prioritize the risks to your organization — but if done incorrectly, it can leave you defenseless.

The post Ready to Try Threat Modeling? Avoid These 4 Common Missteps appeared first on Security Intelligence.

Continue reading Ready to Try Threat Modeling? Avoid These 4 Common Missteps

Bring order to the chaos of incident response and threat investigations

In this podcast recorded at RSA Conference 2018, Leon Ward, VP of Product Management at ThreatQuotient, talks about bringing order to the chaos of security operations, as well as the ideas behind a new product called ThreatQ Investigations. Here’s a tr… Continue reading Bring order to the chaos of incident response and threat investigations

Q&A Part II: Common Misconceptions About Threat Hunting and the Impact of Moving to the Cloud

The post Q&A Part II: Common Misconceptions About Threat Hunting and the Impact of Moving to the Cloud appeared first on Delta Risk.
The post Q&A Part II: Common Misconceptions About Threat Hunting and the Impact of Moving to the Cloud appeared… Continue reading Q&A Part II: Common Misconceptions About Threat Hunting and the Impact of Moving to the Cloud

SOCs require automation to avoid analyst fatigue for emerging threats

A survey conducted by LogicHub at RSA Conference 2018 identified 79 percent of respondents believe both human expertise and security automation is needed for a powerful security infrastructure to keep enterprises safe from breaches. Still, breaches go … Continue reading SOCs require automation to avoid analyst fatigue for emerging threats

Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments

The post Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments appeared first on Delta Risk.
The post Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments appeared first on Security Boulevard.
Continue reading Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments

Would automation lead to improved cybersecurity?

Concerted efforts to increase job satisfaction, automation in the Security Operations Center (SOC) and gamification in the workplace are key to beating cybercriminals at their own game, according to McAfee. Which of the below areas of the cybersecurity… Continue reading Would automation lead to improved cybersecurity?