Many vendors at RSAC 2019 boasted of their advanced and even automated threat hunting capabilities, but it's important to understand the difference between true threat hunting and marketing jargon.
If we look close enough, many new security threats are something we've seen in another form or an attack style we've had to previously defend against.
Whether you're protecting data, financial assets or even people, the intelligence cycle can help you gather data and contextualize it in terms of what you already know and what you hope to learn.
One cybersecurity capability that continues to prove it's here to stay is threat hunting, a proactive approach to discovering and mitigating threats.
Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage
Retail cybersecurity requires a large-scale transition to cope with new threat vectors, close significant infrastructure gaps, and extend security protocols across new cloud and SaaS platforms.
Decoy File System's overlay layer is a forensic tool that helps security teams piece together what happens during a cyberattack and collect key evidence in the aftermath of a breach.
Central to DcyFS's cyber deception capabilities is its ability to modulate subject trust through a hierarchical file system organization.
Decoy File Systems (DcyFS), a new file system approach recently unveiled in Paris, complement access control schemes and can help overcome many of the fundamental limitations of traditional ACLs.
Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.
An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.