The cybersecurity industry is in a crisis. The cost of a data breach hit a whopping $3.86 million (a 6.4% increase from 2017), cybersecurity is considered one of the top four threats to business growth, and “mega breaches” (where 1 to 50 million records are lost) are becoming a weekly occurrence. The solution seems easy […]
We often use anomaly detection to identify potential malicious activity within our organizations, with the data of choice being network telemetry obtained from firewalls and intrusion detection systems, as well as system and application logs. However, anomaly detection has much greater uses, such as identifying how the broader threat environment is changing. This activity provides […]
One of the biggest challenges threat analysts face today is assessing the validity of threat intelligence feeds. Many of those threat intelligence feeds contribute to a large amount of atomic data that is often difficult to relate and correlate in meaningful ways; therefore, it is difficult to determine the relevancy of a threat to the […]
To tweak a traditional saying, you can do a better job catching flies with honey than vinegar. In this case, I’m talking about the “honeypot,” set up to catch the hacker “fly.” To summarize and elaborate upon various definitions over the years, honeypots are computer systems that lure attackers by simulating real systems within a […]
In the first part of this series, I defined cyber threat intelligence sharing and how it can benefit your organization, as well as between organizations. In Part 2, we will review the good and bad of threat intelligence-sharing programs and suggest some solutions. When Does Intelligence Sharing Work? Cyber threat intelligence-sharing communities have experienced varying […]
Defending your organization from cyber-attacks is a daunting challenge when the economics of cybersecurity favors the attacker. For an organization, success means thwarting each and every attack attempt while the attacker only needs one win. The money and data obtained from a breach is valued at only a fraction of the cost that your organization […]
In part 1 of this blog series I highlighted why organizations require independent cyber security systems that can be combined in a collaborative manner to provide more effective threat response. In this week’s final installment of the series, I will answer a key question: How do organizations ensure they are either developing or leveraging technologies […]
As I was preparing to write this blog on the importance of interoperability across cyber defense systems, I read the following news article “Why America’s Two Best Fighter Jets Can’t Talk to Each Other”. One of the salient points in this article is that reportedly the communication systems in the newer model fighter jet is […]