Emotet malware alert: The U.S. Cybersecurity and Infrastructure Security Agency says it's been "tracking a spike" in targeted Emotet malware attacks. It urges all organizations to immediately put in place defenses to not just avoid infection, but also detect lateral movement in their networks by hackers.
Microsoft says it's prepping a patch to fix a memory corruption flaw in multiple versions of Internet Explorer that is being exploited by in-the-wild attackers, and it's issued mitigation guidance. Security firm Qihoo 360 says the zero-day flaw has been exploited by the DarkHotel APT gang.
How can IT and security operations work together to mitigate risk while embracing change?
This new study from Dark Reading finds that while these two groups are getting better at collaborating, several key roadblocks continue to undermine their success. Ready to understand what those roadblocks are and how to...
Does your SOC have a Triad Strategy that includes network-based detection? While the combination of Security Information and Event Management (SIEM) along with Endpoint Detection and Response (EDR) improves security, a day in the life of a SOC analyst is still stressful due to a constant flood of misleading alerts....
Machine-speed attacks require a machine-speed response, yet many of today's organizations still maintain legacy defenses. Mario Vuksan of ReversingLabs discusses the future of SOC triage.
Your machine data has a record of all of the activity that takes place across your infrastructure. It's become the single most valuable asset in the enterprise, as the secrets to business optimization lie within the scores of microtransactions, including the ability to detect, investigate and respond to threats. And...
Security operations (SecOps) and network teams (NetOps) have traditionally acted separately, but increasing IT complexity and scale means that aligning these two groups is a critical step towards delivering a fast and secure user experience.
A recent global SANS Institute survey found that only 30 percent of SecOps...
All enterprises need to grant their employees access to the right digital and physical resources. They also need to digitize their businesses, protect their data, and comply with various local and global regulations.
Nexus helps resolve these identity challenges that most enterprises face, regardless of the...
With cybersecurity teams increasingly overworked and understaffed, organizations must prioritize more intelligent approaches to automating mundane tasks and freeing experts to focus on high-impact tasks, says Franklyn Jones of Cequence Security.
In 2018, the Cybereason Research team identified a series of attacks targeting telecommunications companies. These attacks shared the same TTPs and consisted of a webshell execution followed by the deployment of Poison Ivy, a well-known RAT attributed to Chinese APT groups.
Security operations (SecOps) and network teams (NetOps) have traditionally acted separately, but increasing IT complexity and scale means that aligning these two groups is a critical step towards delivering a fast and secure user experience.
A recent global SANS Institute survey found that only 30 percent of SecOps...
The SANS 2019 Security Operations Survey focuses on how organizations worldwide are adapting to technological shifts and keeping their businesses safe against constantly innovating attackers.
Download this white paper to learn about SOC best practices and more:
Network-based detection tools had the highest levels...
Even after implementing SOAR, SIEM, IDPS and other technologies to improve security insights, companies still spend thousands of hours triaging alerts that are mostly false positives. Given the ever-increasing volume of alerts, SOC teams are forced into a "do what you can do" strategy that focuses on high-value, high...
Popular business applications are increasingly delivered through the cloud using a software-as-a-service (SaaS) model, and cybersecurity applications are no exception. This is good news for small to midsize enterprises (SMEs) that don't have the budgets for in-house security technologies like a SIEM, and lack security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.