Threat Hunting September 12, 2018 A Beginner’s Guide to Threat Hunting 3 min read - Threat hunting is a complex and labor-intensive task, but it can go a long way toward helping your organization detect APTs before they can cause damage to the network.
Intelligence & Analytics September 7, 2018 Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment < 1 min read - Security ecosystems and threat hunting techniques have evolved since the introduction of SIEM more than 15 years ago. Is your security intelligence strategy up to date?
Intelligence & Analytics August 28, 2018 3 Key Areas of Security Operations to Benchmark and Evaluate 3 min read - SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow.
Threat Hunting August 10, 2018 Know Your Enemy: How to Build a Successful Threat Hunting Program 3 min read - To build a successful threat hunting program, you must thoroughly understand who might attack your organization, what these malicious actors might be after and what tactics they'll use to get it.
Identity & Access August 10, 2018 Identity Is the New Perimeter — But Where’s Its Firewall? 3 min read - Network and endpoint access procedures have progressed to the point that now identity is the new perimeter of cybersecurity. Improving methods of multifactor authentication is crucial to building trust.
Artificial Intelligence August 9, 2018 How to Outsmart the Smart City 5 min read - Researchers from Threatcare and IBM X-Force Red joined forces to test several smart city devices, with the goal of investigating "supervillain-level" attacks. Here's what the teams found.
Artificial Intelligence August 8, 2018 DeepLocker: How AI Can Power a Stealthy New Breed of Malware 7 min read - DeepLocker has changed the game of malware evasion by taking a fundamentally different approach from any other current evasive and targeted malware. Here's what you need to know.
Intelligence & Analytics August 8, 2018 Become a JSON Formatter — and Kick Your Security Integrations Into Action 4 min read - Becoming a JSON formatter, and packing up your data in a new way, can reduce or eliminate the need for custom work and save your security team precious time.
Threat Intelligence July 24, 2018 How Open Source Intelligence Could Save Your Network 4 min read - Open source intelligence enables analysts to identify threats and uncover details about attacker behavior to improve their decision-making around incident response.
Intelligence & Analytics July 13, 2018 Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help 3 min read - Today's security teams lack the time, talent and resources to keep up with the rapidly evolving threat landscape. AI can automate tedious processes and take some pressure off security analysts.