Threat Hunting is critical for any digitally connected organization to promote proper security hygiene, reduce compromise dwell time and exposure, discover gaps, and reduce the exposed attack surface. Today’s sophisticated and targeted threats require active hunting rather than passive detection to keep an organization safe and secure via investigation and anomaly detection tailored toward organization-specific services and implementations.
Because of the relative newness of the field and the demand for cybersecurity talent, there’s an assumption that only the most sophisticated organizations are able to leverage threat hunting activities. However, in reality, organizations do not have to be highly resourced or sophisticated to effectively leverage threat hunting to protect themselves from cyber risks.
Cyber threat intelligence — properly gathered, refined, and applied — can help organizations recognize cyber risks and implement protections that specifically address the most serious risks to the integrity and functioning of their organization.
The massive SolarWinds breach that took place earlier this year should set clear precedence that the supply chain and third-party risks are only increasing and should be taken very seriously. These breaches demonstrate that “check-list security” is no longer enough to ensure protection, and that, now more than ever, understanding one’s supply chain network dependencies is critical within a cybersecurity program.
The current exploit release cycle is as consistent as moon phases. The financial profitability of both creator and exploiter is higher than ever, with no signs of slowing down.
We’ve come a long way as an industry. Time moves fast when you get older. It seems like yesterday I was trying to convince people of the value of doing basic network segmentation across data centers.
With the rise of DevOps, the movement to improve software development speed and reliability, it’s no surprise that we also want to make our software more secure
Keeping an up to date inventory of cyber assets has never been easy. When IT consisted of static assets, organizations struggled to maintain comprehensive inventory knowledge, even with slow-moving changes to environments.
You may have heard the term “Attack Surface Management” gaining popularity throughout the cybersecurity industry. But what exactly is your attack surface?