Reducing Investigation Time: How to Quickly Parse True Positives

In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the non-consequential incidents from the consequential incidents helps reduce the investigative time for the secu… Continue reading Reducing Investigation Time: How to Quickly Parse True Positives

Under which conditions can dllhost.exe spawn child process? | MITRE ATT&CK T1191

I was looking for conditions/circumstances under which Dllhost.exe can spawn a child process. I examined a huge quantity of event logs from various Windows system and didn’t come across any event in which Dllhost.exe spawns a child process… Continue reading Under which conditions can dllhost.exe spawn child process? | MITRE ATT&CK T1191

I have millions of spam and threat emails hitting our network daily, who wants to buy this data? [on hold]

we see over 10 million threat and spam emails on a daily basis and provide this data to a handful of vendors. Can anyone suggest who else we should be speaking with re our feed and how they can make use of this data?

Continue reading I have millions of spam and threat emails hitting our network daily, who wants to buy this data? [on hold]

Using Machine Learning to Address Evolving Threats

There are many benefits to using machine learning as part of your cybersecurity strategy Cyberthreats posed by malicious actors have never been more prevalent nor potentially harmful as they are now. Each attack has the potential to cripple an organiz… Continue reading Using Machine Learning to Address Evolving Threats