By Mark St. John We built our platform to help your organization remove cyber exposures before being detected and leveraged by bad actors. Security controls have advanced dramatically in the past decade; however, statistics point to external attackers still being the source of the vast majority of breaches. The Verizon Data Breach Investigations 2020 report […]
Enterprises battling cyber threats to their own organization and their third parties continuously invest in approaches that may give them the advantage over their adversaries. This blog highlights how deception-based network defense is one such approach gaining interest. Let’s start by defining what deception is. Deception is an act or statement which misleads, hides the […]
Today’s security defenders are tasked with the challenge of detecting – and mitigating – cybersecurity threats, no matter the origin (cloud, Internet, insider, email…etc). However, depending on the nature and sophistication of the threat, there is no single point in an organization’s security infrastructure that can see all aspects of the threat – whether coming […]
Today, there are many open-source software projects that provide incredible value to solving a myriad of problems for security detection and mitigation, but not all frameworks necessarily translate from conception into operation easily. Zeek is different. Rooted in 20 years of research, Zeek, an open-source software project that can help security operations teams achieve more […]
Today, threat actors are increasingly successful at utilizing automation to execute their attacks. More often than not, their success stems from collaboration with other skilled actors on the Dark Web, leveraging each other’s shared knowledge and toolkits. This collaboration over tactics, techniques, and procedures (TTPs) , as well as an overall increased investment in time […]
Today, enterprises are faced with a plethora of network security solutions attempting to address requirements including higher throughput, as well as advanced threat detection and mitigation. The challenges also require easy deployment across virtual and non-virtual infrastructures while also being cost-effective. Achieving a solution across those diverse and often competing requirements can be a challenge. […]
Today, the cybersecurity industry is faced with an increasingly capable set of threat actors using advanced strategies, tactics, and techniques. Threat actors are able to leverage advanced tools to apply them within multi-phased and multi-pronged campaigns to reach their objectives. While defenders are improving their ability to model, visualize, and understand those attack strategies as […]
The term Big Data is often misused or used to represent many different concepts depending on who is delivering the message or what context that data is being used for. In its simplest definition, Big Data refers to data sets that are too large for traditional data processing techniques to manage or manipulate. Within cybersecurity, the term is often […]