Bring order to the chaos of incident response and threat investigations

In this podcast recorded at RSA Conference 2018, Leon Ward, VP of Product Management at ThreatQuotient, talks about bringing order to the chaos of security operations, as well as the ideas behind a new product called ThreatQ Investigations. Here’s a tr… Continue reading Bring order to the chaos of incident response and threat investigations

Q&A Part II: Common Misconceptions About Threat Hunting and the Impact of Moving to the Cloud

The post Q&A Part II: Common Misconceptions About Threat Hunting and the Impact of Moving to the Cloud appeared first on Delta Risk.
The post Q&A Part II: Common Misconceptions About Threat Hunting and the Impact of Moving to the Cloud appeared… Continue reading Q&A Part II: Common Misconceptions About Threat Hunting and the Impact of Moving to the Cloud

SOCs require automation to avoid analyst fatigue for emerging threats

A survey conducted by LogicHub at RSA Conference 2018 identified 79 percent of respondents believe both human expertise and security automation is needed for a powerful security infrastructure to keep enterprises safe from breaches. Still, breaches go … Continue reading SOCs require automation to avoid analyst fatigue for emerging threats

Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments

The post Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments appeared first on Delta Risk.
The post Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments appeared first on Security Boulevard.
Continue reading Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments

Would automation lead to improved cybersecurity?

Concerted efforts to increase job satisfaction, automation in the Security Operations Center (SOC) and gamification in the workplace are key to beating cybercriminals at their own game, according to McAfee. Which of the below areas of the cybersecurity… Continue reading Would automation lead to improved cybersecurity?

When Blocking and Tackling Strategies Fail, Take a Page Out of the Threat Hunting Playbook

Many organizations still rely on reactive blocking and tackling strategies, but proactive threat hunting is the only way to detect the type of chatter that is indicative of an impending attack.

The post When Blocking and Tackling Strategies Fail, Take a Page Out of the Threat Hunting Playbook appeared first on Security Intelligence.

Continue reading When Blocking and Tackling Strategies Fail, Take a Page Out of the Threat Hunting Playbook

Threat Hunting Best Practices: Be Ready to Hunt When Cyber Criminals Strike

The post Threat Hunting Best Practices: Be Ready to Hunt When Cyber Criminals Strike appeared first on Delta Risk.
The post Threat Hunting Best Practices: Be Ready to Hunt When Cyber Criminals Strike appeared first on Security Boulevard.
Continue reading Threat Hunting Best Practices: Be Ready to Hunt When Cyber Criminals Strike

AWS acquires threat hunting startup Sqrrl

Amazon Web Services announced Tuesday it acquired Cambridge, Massachusetts, threat hunting company Sqrrl. Terms were not disclosed. Sqrrl CEO Mark Terenzoni wrote on the company’s website that he and his co-workers were “thrilled.” “For now, it is business as usual at Sqrrl. We will continue to work with customers to provide advanced threat hunting capabilities,” Terenzoni said. “And, over time, we’ll work with AWS to do even more on your behalf. Thank you for your support. We really appreciate the trust customers have put into Sqrrl over the past five years, and we are excited about the next phase of our journey.” The deal, which has been rumored for weeks, comes as the cloud computing behemoth continues to boost its secure offerings. In November, AWS announced its Secret Region, which can handle data up to the Secret level of security classification — the second-highest level behind only Top Secret. The […]

The post AWS acquires threat hunting startup Sqrrl appeared first on Cyberscoop.

Continue reading AWS acquires threat hunting startup Sqrrl

Verizon acquires startup Niddel and its automated threat hunting platform

Verizon acquired automated threat hunting startup Niddel, according to a company release issued Friday. The price of the acquisition was not disclosed. Founded in 2014, Niddel offers a platform called Magnet that relies on machine learning, removing the need for human analysts to write code or process data in order to stop threats. Founded by three computer scientists with Brazilian backgrounds, the company was awarded a U.S. patent for “Systems and methods for classifying malicious network events” in 2016. “Verizon is the perfect partner to accelerate our long-term vision of delivering automation and intelligence solutions through machine learning to more organizations throughout the world,” said Niddel CEO Felipe Boucas. “Using machine learning to improve information accuracy significantly reduces false positives and significantly improves our detection and response capabilities,” said Alexander Schlager, Verizon’s executive director for security services, in a release. Verizon has long offered a wide array of cybersecurity services, […]

The post Verizon acquires startup Niddel and its automated threat hunting platform appeared first on Cyberscoop.

Continue reading Verizon acquires startup Niddel and its automated threat hunting platform

Threat Hunters Hansel and Gretel Keep the Forest Safe

Thanks to their harrowing experience with the Evil Witch, Hansel and Gretel went on to become expert threat hunters to protect the children of the forest.

The post Threat Hunters Hansel and Gretel Keep the Forest Safe appeared first on Security Intelligence.

Continue reading Threat Hunters Hansel and Gretel Keep the Forest Safe