Defining XDR from an MSSP Perspective

If you’re not entirely clear on what Extended Detection and Response (XDR) is, you wouldn’t be alone. Most understand it as the evolution of Endpoint Detection and Response (EDR) that covers the areas of the attack surface beyond the endpoint, inc… Continue reading Defining XDR from an MSSP Perspective

Three Keys to a Reliable Ransomware Defense Strategy

As we noted in a previous blog post, ransomware attacks are becoming more frequent and more costly. Reports reveal that there were 304 million ransomware attacks in 2020 – 62% more than the total number of ransomware attacks for 2019. The estimate… Continue reading Three Keys to a Reliable Ransomware Defense Strategy

Push to Digitalization Boosts Cybersecurity Investment

According to a recent Crunchbase report, 2020 was a record year for cybersecurity investments, with more than $7.8 billion invested in the industry globally. The pandemic accelerated digital transformation for many companies, forcing organizations to … Continue reading Push to Digitalization Boosts Cybersecurity Investment

Are TIPs Finally Converging With SIEMs?

When all vendors in a new product category use the same use case to explain their value, I become concerned. About 15 years ago, when bombs were a constant threat in many parts of the world, I heard multiple vendors of intelligent video surveillance e… Continue reading Are TIPs Finally Converging With SIEMs?

Ransomware Decoded: Preventing Modern Ransomware Attacks

Many types of malware silently persist on the network, move laterally, communicate with their C2, or obfuscate their behaviors to prevent detection. In contrast to this, traditional ransomware was all about coming in with a big splash and causing … Continue reading Ransomware Decoded: Preventing Modern Ransomware Attacks

NetWitness ? A Brief History of an Iconic Threat Detection & Response Platform

The history of NetWitness reflects the continuous evolution of threats and bad actors. Begun as a government intelligence research project, NetWitness has earned a reputation as the most powerful detection and forensics platform in the industry.
The po… Continue reading NetWitness ? A Brief History of an Iconic Threat Detection & Response Platform

Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks

In our newest whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” we dive into how traditional cybersecurity tools work, why this fundamentally limits them from being able to detect zero-day or pre… Continue reading Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks

Rise of Double-Extortion Shines Spotlight on Ransomware Prevention

Double extortion is a tactic employed by some ransomware gangs. It begins when a crypto-malware strain steals information stored on a victim’s machine before launching its encryption routine.
The post Rise of Double-Extortion Shines Spotlight on R… Continue reading Rise of Double-Extortion Shines Spotlight on Ransomware Prevention

XDR and MDR: What’s the difference and why does it matter?

The cybersecurity industry loves acronyms and XDR is rising swiftly to the top of the charts of the current lexicon. Extended detection and response (XDR) is a designation used when you do not have the ability to cover a wide range of threat vectors. S… Continue reading XDR and MDR: What’s the difference and why does it matter?

Review: Group-IB Threat Hunting Framework

The IT infrastructure of larger organizations is very heterogeneous. They have endpoints, servers and mobile devices running various operating systems and accessing internal systems. On those systems, there is a great number of disparate tools – from o… Continue reading Review: Group-IB Threat Hunting Framework