How Relevance Scoring Can Make Your Threat Intelligence More Actionable

Relevance scoring is a technique that correlates the properties of security analysts’ threat intelligence and those of their organization, such as the industry and region.

The post How Relevance Scoring Can Make Your Threat Intelligence More Actionable appeared first on Security Intelligence.

Continue reading How Relevance Scoring Can Make Your Threat Intelligence More Actionable

Automatically Discover, Prioritize and Remediate Apache Tomcat AJP File Inclusion Vulnerability (CVE-2020-1938) using Qualys VMDR

A severe vulnerability exists in Apache Tomcat’s Apache JServ Protocol. The Chinese cyber security company Chaitin Tech discovered the vulnerability, which is named “Ghostcat” and is tracked using CVE-2020-1938. The security issu… Continue reading Automatically Discover, Prioritize and Remediate Apache Tomcat AJP File Inclusion Vulnerability (CVE-2020-1938) using Qualys VMDR

Embracing the Power of Community for Better Security

Threat actors seem to do better than defenders in a key area: collaboration. To effectively fight threats, we need to collaborate as a community and reimagine security as an open construct.

The post Embracing the Power of Community for Better Security appeared first on Security Intelligence.

Continue reading Embracing the Power of Community for Better Security

Hunting for the True Meaning of Threat Hunting at RSAC 2019

Many vendors at RSAC 2019 boasted of their advanced and even automated threat hunting capabilities, but it’s important to understand the difference between true threat hunting and marketing jargon.

The post Hunting for the True Meaning of Threat Hunting at RSAC 2019 appeared first on Security Intelligence.

Continue reading Hunting for the True Meaning of Threat Hunting at RSAC 2019

What Security Threats of the Past Can Tell Us About the Future of Cybersecurity

If we look close enough, many new security threats are something we’ve seen in another form or an attack style we’ve had to previously defend against.

The post What Security Threats of the Past Can Tell Us About the Future of Cybersecurity appeared first on Security Intelligence.

Continue reading What Security Threats of the Past Can Tell Us About the Future of Cybersecurity

Embrace the Intelligence Cycle to Secure Your Business

Whether you’re protecting data, financial assets or even people, the intelligence cycle can help you gather data and contextualize it in terms of what you already know and what you hope to learn.

The post Embrace the Intelligence Cycle to Secure Your Business appeared first on Security Intelligence.

Continue reading Embrace the Intelligence Cycle to Secure Your Business

More Than Just a Fad: Lessons Learned About Threat Hunting in 2018

One cybersecurity capability that continues to prove it’s here to stay is threat hunting, a proactive approach to discovering and mitigating threats.

The post More Than Just a Fad: Lessons Learned About Threat Hunting in 2018 appeared first on Security Intelligence.

Continue reading More Than Just a Fad: Lessons Learned About Threat Hunting in 2018

Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage

Retail cybersecurity requires a large-scale transition to cope with new threat vectors, close significant infrastructure gaps, and extend security protocols across new cloud and SaaS platforms.

The post Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage appeared first on Security Intelligence.

Continue reading Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage

Following the Clues With DcyFS: A File System for Forensics

Decoy File System’s overlay layer is a forensic tool that helps security teams piece together what happens during a cyberattack and collect key evidence in the aftermath of a breach.

The post Following the Clues With DcyFS: A File System for Forensics appeared first on Security Intelligence.

Continue reading Following the Clues With DcyFS: A File System for Forensics

Reconciling Trust With Security: A Closer Look at Cyber Deception With DcyFS

Central to DcyFS’s cyber deception capabilities is its ability to modulate subject trust through a hierarchical file system organization.

The post Reconciling Trust With Security: A Closer Look at Cyber Deception With DcyFS appeared first on Security Intelligence.

Continue reading Reconciling Trust With Security: A Closer Look at Cyber Deception With DcyFS