
Colonial Pipeline Ransomware Attack: Lessons for Technologists
Eliminate monitoring blind spots in your SIEM using MITRE ATT&CK.
Eliminate monitoring blind spots in your SIEM using MITRE ATT&CK.
75% of organizations that forward identity logs such as Active Directory and Okta to their SIEM, do not use them.
Second annual report analyzed production SIEM instances to understand SOC preparedness to detect latest adversary techniques in MITRE ATT&CK.
Actual coverage remains far below what most organizations expect; organizations unaware of gap between their assumed security and defenses actually in place.
What the lawsuit about the SolarWinds attack teaches us about minimum standards of due care.
Why going after MSPs is an increasingly common type of supply chain attack
How standard frameworks like VERIS and MITRE ATT&CK enable a standard language and taxonomy about cyberattacks
Use MITRE ATT&CK to ensure you have detections for the latest adversary techniques employed by APT groups like Deep Panda.
Automation is critical for addressing constant change in threat landscape — plus exponential increase in volume of data collected to spot suspicious activities.
A natural curiosity for how things work, such as what the database logs tell you or what does a specific cloud permission let you do.
Monitor suspicious processes spawned by Java. Avoid false positives by investigating logs at least 90 days back and whitelisting known child-process.
Industrial control systems are juicy targets for nation-state attackers because they typically don’t have the same level of monitoring as corporate IT networks.