Revolutionary threat hunting platform for massive data


A global platform for analyzing enterprise security telemetry Enterprises today has security systems in place, often including network security devices such as firewalls, SIEMs, IDS, secure web gateways, network anomaly behavior, deception, packet capture, and endpoint security devices such as EDR technologies, email security, encryption technologies, etc.. Together, these solutions generate massive amount of telemetry... Continue Reading →

Advertisements

Modern CyberSOC – Brief and Implementation Strategy on building a Collaborative Cyber Security Infrastructure


In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM, etc.) and the prioritize in building the SOC provides security and the CIA was maintained. However, later the emerge of the attacks and the threat actors becomes more challenge and the existing SOC will not able to provide better security over the CIA. There... Continue Reading →

Cyber kill chain is dead


cyber kill chain vs MITRE

Threat Hunting = Use humans to find stuff


Organizations realize that cyber security investments are not avoidable in digital economy and has leading security technologies to identify, protect, detect, respond and recover from various attack vectors. But, Can they sit and relax for tools and technologies to alert them? If yes, why companies waiting an average of 220 days between the intrusion and... Continue Reading →

Quantum computers pose a significant risk to Bitcoin.


Bitcoin is no stranger to controversy. It has weathered various storms over its security. But that is no guarantee that bitcoin will cope well in the future. One of Japan’s largest cryptocurrency exchanges has revealed that it’s lost nearly $400 million in a security breach. Coincheck says that it has restricted deposits and withdrawals for a cryptocurrency... Continue Reading →

The digital world needs an “immune system.”


Chronicle was born in 2016 as a project within X, Alphabet’s moonshot factory. They see a future where enterprise security teams can find and stop cyberattacks before they cause harm. By applying planet-scale computing and analytics to security operations, Chronicle provide the tools teams need to secure their networks and their customers’ data. Stephen Gillett... Continue Reading →

Blog at WordPress.com.

Up ↑

%d bloggers like this: