Another category? Why we need ITDR

Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in […]

The post Another category? Why we need ITDR appeared first on Security Intelligence.

Continue reading Another category? Why we need ITDR

Does your security program suffer from piecemeal detection and response?

Piecemeal Detection and Response (PDR) can manifest in various ways. The most common symptoms of PDR include: Multiple security information and event management (SIEM) tools (e.g., one on-premise and one in the cloud) Spending too much time or energy on integrating detection systems An underperforming security orchestration, automation and response (SOAR) system Only capable of […]

The post Does your security program suffer from piecemeal detection and response? appeared first on Security Intelligence.

Continue reading Does your security program suffer from piecemeal detection and response?

Seasoned cyber pros are more complacent in their skills than junior staff

Average response time accelerated from 29 to 19 days, from 2021 to 2022, with lessons from Log4j and other high-profile vulnerabilities having a significant impact on urgency levels, according to Immersive Labs. Faster response time to new threats Impr… Continue reading Seasoned cyber pros are more complacent in their skills than junior staff

What you should look for in an MDR relationship

The managed IT services market is growing both in size and importance, as more organizations decide it makes fiscal and operational sense to outsource key functions. This is true even for critical security-oriented tasks, due to both environmental and … Continue reading What you should look for in an MDR relationship

To Cybersecurity Incident Responders Holding the Digital Front Line, We Salute You

Over the course of two decades, I’ve seen Incident Response (IR) take on many forms. Cybercrime’s evolution has pulled the nature of IR along with it — shifts in cybercriminals’ tactics and motives have been constant. Even the cybercriminal psyche has completely rebirthed, with more collaboration amongst gangs and fully established ransomware enterprises running. When […]

The post To Cybersecurity Incident Responders Holding the Digital Front Line, We Salute You appeared first on Security Intelligence.

Continue reading To Cybersecurity Incident Responders Holding the Digital Front Line, We Salute You

Qualys Context XDR: Bringing context to an organization’s security efforts

Cybersecurity has become more complex than ever, allowing cybercriminals to access organizations through many different routes. To help incident response and threat hunting teams navigate this complex environment, Qualys has unveiled its Qualys Context… Continue reading Qualys Context XDR: Bringing context to an organization’s security efforts

Trends that shaped ransomware – and why it’s not slowing down

Ransomware isn’t showing signs of slowing down in the new year. It’s staked its claim as a major element of the cybercriminal ecosystem and potentially one of the costliest and damaging malware attacks, according to a new report. What we are seeing over the past 18 months, however, is a shift in tactics: Threat actors are targeting ever-larger organizations, and the business model that dictates how ransomware attacks occur is evolving. It’s up to IT professionals to proactively deal with these trends to meet the challenges just on the horizon and beyond. Enterprises can successfully defend themselves from threats when there is a balance between detection and prevention, says a new report produced by SophosLabs and the Sophos Managed Threat Response, Sophos Rapid Response and SophosAI teams. The report covers: The future of ransomware The impact of Ransomware-as-a-Service The expanding threat of extortion-style attacks How misuse of “threat emulation” tools […]

The post Trends that shaped ransomware – and why it’s not slowing down appeared first on CyberScoop.

Continue reading Trends that shaped ransomware – and why it’s not slowing down

XDR: Security’s new frontier

As enterprises transform their IT environment and workforce, finding the right security approach is critical for success. Without the proper protective measures in place, moving services to the cloud can introduce a great deal of risk. For a truly futu… Continue reading XDR: Security’s new frontier