Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting

Threat hunting enables security teams to improve incident response speed and accuracy. It also empowers them to remediate threats proactively.

The post Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting appeared first on Security Intelligence.

Continue reading Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting

Keep Intruders Out of Your Network With Proactive Threat Hunting

Threat hunting promotes a proactive approach to security monitoring and incident response, making it harder for intruders to breach your network.

The post Keep Intruders Out of Your Network With Proactive Threat Hunting appeared first on Security Intelligence.

Continue reading Keep Intruders Out of Your Network With Proactive Threat Hunting

Getting a start on cyber threat hunting

In this age of advanced persistent threats, waiting for traditional threat management solutions like IDS and SIEM to flag incidents and threats is simply not enough anymore. “We live in a world where the adversaries will persist in getting into an organizations environment, and they only have to be successful once. And, on average, companies are breached for more than 200 days before they realize they are compromised,” notes Mark Terenzoni, CEO at Sqrrl, a … More Continue reading Getting a start on cyber threat hunting

Blindfolded on the Battlefield: The Importance of Threat Hunting in the Modern Age

To keep up with today’s advanced cybercrime landscape, security professionals must take a proactive approach to threat hunting and incident response.

The post Blindfolded on the Battlefield: The Importance of Threat Hunting in the Modern Age appeared first on Security Intelligence.

Continue reading Blindfolded on the Battlefield: The Importance of Threat Hunting in the Modern Age

Threat Hunting Services Are Now a Basic Necessity

EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.

The post Threat Hunting Services Are Now a Basic Necessity appeared first on Security Intelligence.

Continue reading Threat Hunting Services Are Now a Basic Necessity

Secrets of successful threat hunters and SOCs

McAfee has polled over 700 IT and security professionals from a diverse set of countries, industries, and organization sizes about the role of threat hunting and the evolution of the security operations center (SOC). Per the survey, companies are investing in and gaining different levels of results from both tools and structured processes as they integrate “threat hunting” activities into the core security operations center. Key findings Looking at security teams through four levels of … More Continue reading Secrets of successful threat hunters and SOCs

Solution Corner: Malwarebytes Incident Response

Unless you’ve been stuck at a fiery music festival, I don’t need to tell you the threat landscape is constantly evolving and that threats have become increasingly sophisticated at evading detection. Recent Malwarebytes Labs reports, including the 2017 State of Malware shine a light on just how fast these threats continue to spread around the…

Categories:

Tags:

(Read more…)

The post Solution Corner: Malwarebytes Incident Response appeared first on Malwarebytes Labs.

Continue reading Solution Corner: Malwarebytes Incident Response

Sqrrl adds $12.3 million to coffers in Series C funding round

Buoyed by the growth surrounding cyberthreat hunting, Cambridge, Massachusetts-based Sqrrl announced a $12.3 million Series C round of investment on Wednesday. The funding was led by Boston-based Spring Lake Equity Partners, with existing investors Matrix Partners, Rally Ventures and Accomplice also participating in the round. The new round comes as popularity in threat hunting platforms continues to grow. Various analyst groups have emphasized the platforms as a good way for security operations centers to proactively detect threats. According a SANS Institute paper released earlier this year, 88 percent of respondents found threat hunting to considerably reduce the amount of time malicious actors patrolled enterprise networks. “We are giving the tools to the analyst to rapidly understand what is happening in their environment and ask questions based on what they see in front of them,” Sqrrl CEO Mark Terenzoni told CyberScoop. Sqrrl (pronounced “squirrel”) was created in 2012, born out of an NSA database project […]

The post Sqrrl adds $12.3 million to coffers in Series C funding round appeared first on Cyberscoop.

Continue reading Sqrrl adds $12.3 million to coffers in Series C funding round

Security News – Paul’s Security Weekly #505

The origin of threat hunting, your microwave is spying on you, 10 must-read books for infosec professionals, and why is IR automation and orchestration so hot? Full Show Notes Subscribe to YouTube Channel Security Weekly Website Follow us on Twitter: @… Continue reading Security News – Paul’s Security Weekly #505

Understanding Cyber Threat Hunting

When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.

The post Understanding Cyber Threat Hunting appeared first on Security Intelligence.

Continue reading Understanding Cyber Threat Hunting