Authentication Platform Okta Confirms Breach Impacts Customer Base
Authentication platform Okta has confirmed they were breached and customer base impacted after threat actors Lapsus$ gained access to the company’s internal environment...
Dan Verton
For many Security Operations Centers (SOCs), conducting useful queries using a traditional Security Information and Event Management (SIEM) requires training and familiarity with syntax language, and deep analysis to take action on the results of a particular hunt.
At an enterprise scale, searches can take several minutes or longer to complete, making SIEM solutions cumbersome to derive new insights or successfully connect threat intelligence and investigate matches.
Threat intelligence is often only matched against newly ingested data, creating coverage gaps and missed threats. In addition to limited IOC monitoring, SIEMs also lack the necessary data retention to effectively leverage threat intelligence.
Threat intelligence is transparently integrated into every corner of the AI-driven Cybereason XDR Platform. Automatically leveraging Machine Learning to amplify internal and external IOC threat sources in the threat detection process. But the real power comes from being able to hunt for behavioral tactics, techniques, and procedures (TTPs) based on more subtle Indicators of Behavior (IOBs).
Let’s take a look at the hunting and investigation capabilities of the Cybereason XDR Platform. In the following demo, we explore:
Cybereason is dedicated to teaming with defenders in both the public and private sectors to end cyber attacks from endpoints to the enterprise to everywhere. Learn more about the Cybereason DFIR advantage here or schedule a demo today to learn how your organization can benefit from an operation-centric approach to security.
Dan Verton is Director of Content Marketing at Cybereason. Dan has 30 years of experience as a former intelligence officer and journalist. He is the 2003 first-place recipient of the Jesse H. Neal National Business Journalism Award for Best News Reporting – the nation’s highest award for tech trade journalism and is the author of the groundbreaking work, Black Ice: The Invisible Threat of Cyber-Terrorism (McGraw-Hill, 2003). He most recently served as an intelligence advisor and co-author of a nationwide TSA anti-terrorism awareness training program.
All Posts by Dan VertonAuthentication platform Okta has confirmed they were breached and customer base impacted after threat actors Lapsus$ gained access to the company’s internal environment...
ISACs were formed to promote the centralized sharing of threat intel within a particular sector. Grant Sewell, Director of Security at AHEAD, shares his experience in working with an ISAC and how this benefited his organization - check it out...
Authentication platform Okta has confirmed they were breached and customer base impacted after threat actors Lapsus$ gained access to the company’s internal environment...
ISACs were formed to promote the centralized sharing of threat intel within a particular sector. Grant Sewell, Director of Security at AHEAD, shares his experience in working with an ISAC and how this benefited his organization - check it out...
Get the latest research, expert insights, and security industry news.
Subscribe