Clickjacking, also known as a “UI Redress Attack,” is a tricky method of getting a user to click on something other than the intended item. Threat actors implement this method by placing buttons or links in front of legitimate items within your view of a web page. In some circumstances, this approach can be used […]
We all know that a strong password is a necessary first step for good cyber hygiene. However, in 2016, 81% of hacking-related breaches leveraged either stolen and/or weak passwords. With numbers like these, it’s no wonder that password-cracking attacks are some of the most used among hackers looking to breach a network.
In many respects, Threat Intelligence (TI) programs are still in their infancy, and security professionals are still struggling to put these programs together. To help security professionals, who strive to build successful TI programs, I recently held a webinar series, “Success Factors in Threat Intelligence” that described a comprehensive business technical approach to the justification, definition, design, and execution of TI programs.
In collaboration with LookingGlass, Polarity developed a real-time integration to the LookingGlass scoutPRIME threat intelligence platform. scoutPRIME makes security analysts more efficient in addressing their threat landscape by customizing how threat intelligence is viewed, scored, prioritized, and acted upon.
In our last blog, Chief Technology Officer Allan Thomson and Principal Data Scientist Dr. Jamison Day discussed threat intelligence and security telemetry for assessing targeting attacks. Today, they delve into different threat correlation techniques security professionals can use to assess targeted attacks. Threat correlation identifies new cyber threat insights by associating events from multiple data sources. […]
The current number of active cyber threats is astounding. If your organization is like most, your cyber security team doesn’t have the capacity to manually detect, monitor, and defend against all of today’s known threats. Effective cyber threat management requires leveraging automation to inform decisions about when and where to take action. Typically, threats that […]
The cyber landscape is constantly evolving, and in turn, security products need to evolve with it. One of the most common questions cyber security professionals have is how to stop real-time threats with the limited resources at their disposal. There is a cost for tools, processes and manpower. As CISOs and VPs of Security Operations […]
Last week, I attended the 13th annual FloCon 2017 in San Diego, CA, an event focused on large-scale network analytics. This year’s theme was ‘Flow and Beyond’ and presentations focused on enhancing incident detection and network situational awareness. On this note, my colleague Dr Jamison Day and I focused our talk on Assessing Targeted Attacks […]
This blog series explores three fundamental challenges our customers have when leveraging a Threat Intelligence Platform (TIP). In this blog, we discuss the last challenge of operationalizing threat defense. The TIP has become a critical part of any mature security operation environment, where threat analysis and relevant threat intelligence can drive the actions of other […]