When Blocking and Tackling Strategies Fail, Take a Page Out of the Threat Hunting Playbook

Many organizations still rely on reactive blocking and tackling strategies, but proactive threat hunting is the only way to detect the type of chatter that is indicative of an impending attack.

The post When Blocking and Tackling Strategies Fail, Take a Page Out of the Threat Hunting Playbook appeared first on Security Intelligence.

Continue reading When Blocking and Tackling Strategies Fail, Take a Page Out of the Threat Hunting Playbook

Threat Hunting Best Practices: Be Ready to Hunt When Cyber Criminals Strike

The post Threat Hunting Best Practices: Be Ready to Hunt When Cyber Criminals Strike appeared first on Delta Risk.
The post Threat Hunting Best Practices: Be Ready to Hunt When Cyber Criminals Strike appeared first on Security Boulevard.
Continue reading Threat Hunting Best Practices: Be Ready to Hunt When Cyber Criminals Strike

AWS acquires threat hunting startup Sqrrl

Amazon Web Services announced Tuesday it acquired Cambridge, Massachusetts, threat hunting company Sqrrl. Terms were not disclosed. Sqrrl CEO Mark Terenzoni wrote on the company’s website that he and his co-workers were “thrilled.” “For now, it is business as usual at Sqrrl. We will continue to work with customers to provide advanced threat hunting capabilities,” Terenzoni said. “And, over time, we’ll work with AWS to do even more on your behalf. Thank you for your support. We really appreciate the trust customers have put into Sqrrl over the past five years, and we are excited about the next phase of our journey.” The deal, which has been rumored for weeks, comes as the cloud computing behemoth continues to boost its secure offerings. In November, AWS announced its Secret Region, which can handle data up to the Secret level of security classification — the second-highest level behind only Top Secret. The […]

The post AWS acquires threat hunting startup Sqrrl appeared first on Cyberscoop.

Continue reading AWS acquires threat hunting startup Sqrrl

Verizon acquires startup Niddel and its automated threat hunting platform

Verizon acquired automated threat hunting startup Niddel, according to a company release issued Friday. The price of the acquisition was not disclosed. Founded in 2014, Niddel offers a platform called Magnet that relies on machine learning, removing the need for human analysts to write code or process data in order to stop threats. Founded by three computer scientists with Brazilian backgrounds, the company was awarded a U.S. patent for “Systems and methods for classifying malicious network events” in 2016. “Verizon is the perfect partner to accelerate our long-term vision of delivering automation and intelligence solutions through machine learning to more organizations throughout the world,” said Niddel CEO Felipe Boucas. “Using machine learning to improve information accuracy significantly reduces false positives and significantly improves our detection and response capabilities,” said Alexander Schlager, Verizon’s executive director for security services, in a release. Verizon has long offered a wide array of cybersecurity services, […]

The post Verizon acquires startup Niddel and its automated threat hunting platform appeared first on Cyberscoop.

Continue reading Verizon acquires startup Niddel and its automated threat hunting platform

Threat Hunters Hansel and Gretel Keep the Forest Safe

Thanks to their harrowing experience with the Evil Witch, Hansel and Gretel went on to become expert threat hunters to protect the children of the forest.

The post Threat Hunters Hansel and Gretel Keep the Forest Safe appeared first on Security Intelligence.

Continue reading Threat Hunters Hansel and Gretel Keep the Forest Safe

Deloitte launches Threat Hunting-As-A-Service powered by Sqrrl

Deloitte CyberSOC EMEA Center, SL. closed a strategic agreement with Sqrrl to provide Managed Threat Hunting Services to clients in the EMEA region using Sqrrl’s threat hunting platform. Threat hunting is the proactive search for cyber adversaries that… Continue reading Deloitte launches Threat Hunting-As-A-Service powered by Sqrrl

Diving Deeper to Understand, Investigate and Mitigate Cyberthreats

Investigative analysis tools enable SOC teams to proactively hunt for and mitigate cyberthreats instead of meticulously collecting and curating data.

The post Diving Deeper to Understand, Investigate and Mitigate Cyberthreats appeared first on Security Intelligence.

Continue reading Diving Deeper to Understand, Investigate and Mitigate Cyberthreats

Using a robust platform for cyber threat analysis training

We have recognised threats coming more regularly from varied origins such as nation-states, hacktivist and cybercriminal actors. Coupled with many new public policies aimed at mitigating the negative effects of data breaches, cyber espionage and intellectual property theft, it’s clear a new ecosystem of cyber threat intelligence sharing is emerging. As more intelligence teams become established with the aim to fortify networks and reduce the liabilities and risks associated with data breaches, the need for … More Continue reading Using a robust platform for cyber threat analysis training

Laying the foundation for a proactive SOC

Most companies are trying to shift their Security Operations Center (SOC) from a reactive to a proactive posture. To do that, the analysts’ reaction to security events must become swift, and investigation of security alerts and incidents must become more efficient. Once high effectiveness is achieved, the analysts can concentrate even more on hunting and detecting threats within the network before they become a problem. Based on the interest our recent article on getting a … More Continue reading Laying the foundation for a proactive SOC

Cyber threat analysis in complex adaptive systems

The use of wartime analogies in cybersecurity is common in our industry. Sun Tzu is often quoted in presentations and papers to emphasize an author’s key point. I will spare you that in this article; however, I would like to introduce the idea of applying a rigorous framework derived from kinetic warfare to the cyber realm. The notion of complex adaptive systems (CAS) as introduced by Brigadier General Wayne Michael Hall and Dr. Gary Citrenbaum … More Continue reading Cyber threat analysis in complex adaptive systems