IBM X-Force has reported a huge increase in COVID-19-related spam. Malicious domains have also rapidly expanded during the first quarter of 2020

Focus on Security Fundamentals

One of the key fundamental approaches for security is to ensure your security team can identify, investigate and respond to threats. We recommend mining network data to help identify potential vulnerabilities and understand the nature of the cybersecurity threats that have emerged during the crisis. This can help offset increases in phishing attacks targeting remote workers and users interested in COVID-19.

Network Security Helps Pinpoint Attacks on Remote Users

Enterprises need to gain visibility and control over company assets, including home office devices, so they can detect unusual behavior and take corrective actions. Vital clues exist in network traffic; all attacks utilize the network at some point. Visibility into network traffic allows you to uncover anomalies in normal user activities, which could be symptoms of malware attacks.

Today’s environment has brought in more remote traffic and unusual email communications from government agencies and third parties, so focusing on network traffic can still surface phishing attacks and enable your security operations teams to detect, investigate and respond.

Key actions to defend against these attacks are gaining visibility into the network traffic, monitoring user and network behaviors correlating to known threats across the enterprise. In many cases, security analysts have used different tools independently in order to gather relevant information and confirm there is a high risk threat attack under way. The speed of detection and response can be improved if these tools are integrated together to help guide the security administrator through an analysis.

An Integrated Approach to Securing Networks

The live webinar “Why APTs Can Be So Difficult To Find, Investigate, And Resolve” at 2 pm (EST) July 21, 2020, and at 9 am (EST) July 22, 2020, brings together security industry leaders from IBM, Gigamon and Endace to discuss effective approaches for quickly discovering advanced persistent threats (APTs) and confidently finding unalterable evidence of these complex threats.

The webinar will discuss how you can decrypt network traffic, correlate this traffic with user behavior analysis, gain insights into the attack and provide a fast investigation pivot into EndaceVision to investigate the network packets for detailed analysis.

Sign up for the webinar

Together, these technologies can:

  • Record network traffic (packet capture).
  • Analyze network traffic and flows.
  • Decrypt network traffic to make it available for visibility.
  • Correlate and prioritize security events.
  • Analyze user behavior to find malicious users and identify risk scores.
  • Predict outcomes, and recommend next steps with new AI models.
  • Speed response and visualize attack stages using MITRE ATT&CK.
  • Gain insights from Watson’s 10 billion plus security data points.

Come see how they work together to provide the ability to quickly detect, investigate and respond to these threats.

More from Network

X-Force Identifies Vulnerability in IoT Platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

4 min read

Cybersecurity in the Next-Generation Space Age, Pt. 4: New Space Future Development and Challenges

4 min read - View Part 1, Introduction to New Space, Part 2, Cybersecurity Threats in New Space, and Part 3, Securing the New Space, in this series. After the previous three parts of this series, we ascertain that the technological evolution of New Space ventures expanded the threats that targeted the space system components. These threats could be countered by various cybersecurity measures. However, the New Space has brought about a significant shift in the industry. This wave of innovation is reshaping the future…

4 min read

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

4 min read - Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

4 min read

Cybersecurity in the Next-Generation Space Age, Pt. 2: Cybersecurity Threats in New Space

7 min read - View Part 1 in this series, Introduction to New Space. The growth of the New Space economy, the innovation in technologies and the emergence of various private firms have contributed to the development of the space industry. Despite this growth, there has also been an expansion of the cyberattack surface of space systems. Attacks are becoming more and more sophisticated and affecting several components of the space system’s architecture. Threat Actors' Methodology Every space system architecture is composed of three…

7 min read