Read all of our news, articles, reviews, and more in our company blog
The modern cyber threat landscape is defined by automated actors such as commodity malware, crimeware, insider threats, and the generic actions of “hacktivists”. Dealing with such innate cybersecurity threats which are churned out in large volumes requires a high-level of orchestration which enables security teams to deal with more important issues.
Mental Games: Threat Hunting Mental Models, Strategies, and Normal Behavior In the cyber security market today, there is a lot of buzzwords, one of them is threat hunting. Many tools and services claim they have threat hunting capabilities, but in most cases, this isn’t 100% true.
Carbon Black (CB) Defense is a distributed process monitoring tool for threat detection across enterprise networks. The Carbon Black sensor executes data capturing activities to discover suspicious activities that occur within a network. Once deployed, the CB Defense sensor stays on and always collects data that can be categorized and analyzed for suspicious activities.
Find out what sets apart Microsoft's new SIEM tool (Azure Sentinel) from the rest of the solutions in the marketplace. Take a deeper look at Threat Hunting within Azure Sentinel and five features that make Sentinel an effective tool for security teams rather they use Azure or not. As far as data breaches go, 2019 is shaping up to be a landmark year based on the findings of the 2019 MidYear QuickView report published by Risk Based Security.
Learn why packet level detail and full packet capture are critical to the forensic capabilities of a security analyst. Listed below are the top 7 reasons why packets are superior to logs alone.
Outlined below is a brief synopsis of what MDR is, how it is different and valuable as well as how it is delivered. What is MDR? MDR (Managed Detection and Response) is the ability to focus on a true threat instead of millions of alerts and notifications from various tools. MDR providers deliver services for buyers looking to implement or improve their threat detection, response, and continuous-monitoring capabilities.