Cyber Threat Intelligence Sources


On Feb 12, 2015, US president sign an Executive Order to encourage and promote sharing of cybersecurity threat information within the private sector and between the private sector and government. Rapid information sharing is an essential element of effective cybersecurity, because it enables companies to work together to respond to threats, rather than operating alone.... Continue Reading →

Advertisements

Revolutionary threat hunting platform for massive data


A global platform for analyzing enterprise security telemetry Enterprises today has security systems in place, often including network security devices such as firewalls, SIEMs, IDS, secure web gateways, network anomaly behavior, deception, packet capture, and endpoint security devices such as EDR technologies, email security, encryption technologies, etc.. Together, these solutions generate massive amount of telemetry... Continue Reading →

Multi Cloud Security Technology Requirements


https://www.slideshare.net/RasoolKareemIrfan/multi-cloud-security-technology-requirements Its multi cloud world According to IDC CloudView; 85% of enterprise evaluating or using public cloud, 87% of them taken steps towards a hybrid cloud strategy and 94% of than have plan to use multiple clouds. Based on the public cloud market research ( Gartner : ID G00336148) Gartner predicts IaaS spending in public... Continue Reading →

Cyber kill chain is dead


cyber kill chain vs MITRE

Threat Hunting = Use humans to find stuff


Organizations realize that cyber security investments are not avoidable in digital economy and has leading security technologies to identify, protect, detect, respond and recover from various attack vectors. But, Can they sit and relax for tools and technologies to alert them? If yes, why companies waiting an average of 220 days between the intrusion and... Continue Reading →

Blog at WordPress.com.

Up ↑

%d bloggers like this: