Get the latest research, expert insights, and security industry news.
During the past few months, many companies have contacted us with various questions and requests about remote security. In our conversations with them, we’ve noticed four key challenges that we wanted to explore.
Read MoreWhen trying to address the question “Is my SOC as effective as possible?”, one of the most challenging components you will face is staffing. In this blog, I'll be covering how to answer some of the more difficult questions when it comes to building a SOC.
Read MoreIn order to address the evolving threat landscape, the security industry has turned to more comprehensive endpoint protection platforms. What are they?
Read MoreUnlike file-based attacks, fileless malware abuses legitimate tools to carry out attacks. Read about it with examples from real attacks now.
Read MoreIn Q1 2018, fileless attacks were up 94%. Learn about what fileless malware is with common examples from the Cybereason Nocturnus team's research.
Read MoreMany find the process of threat hunting to be too demanding. What techniques do you use to hunt? Where do you even begin?
Read MoreDuring the recent MITRE evaluations, it became apparent that many security vendors, while able to detect threats, were doing so well after the fact. It's important to consider what these delayed detections would mean for a SOC experiencing a real breach.
Read MoreThe MITRE ATT&CK framework is a complex solution to a complex problem. Rather than simply scoring vendors on a linear scale, it offers a more profound view of capabilities, applicability, and use-case. This is what you need to know about the way MITRE uses ATT&CK to evaluate security vendors, and how threat hunting factors into the ATT&CK framework.
Read More