The digital revolution has given healthcare organizations new tools to increase team efficiency and improve their customer experience. But it's also opened up new vectors that cybercriminals can use to attack. As your attack surface expands to infrastructure that you don't own or control, becomes increasingly...
What if you could leverage a secret weapon that you already have in your security stack to see attacks and protect roaming users, from any device? With visibility into all internet requests across your network, across every port, protocol or app you can uncover and block connections to malicious domains and...
As a general rule, negligent incidents are far more common than malicious ones. Negligent insiders are employees that unintentionally jeopardize security, often through well-intentioned ignorance, laziness, or simple human error.
While many security teams make the mistake of focusing exclusively on would-be malicious...
When security controls fail, can you detect unusual and anomalous activity with sufficient context to accurately ascertain the risk to the organization?
At a time when security professionals are faced not only with a barrage of threats, but with a myriad of threat intelligence data sources, it can be challenging to know when to stop an investigation. Join DomainTools Senior Security Engineer Tarik Saleh to learn essential methodologies from a blue team perspective.
Can you answer this question with a confident yes?
When security controls fail, can you detect unusual and anomalous activity with sufficient context to accurately ascertain the risk to the organization?
Most organizations don't even know when security controls have failed. This is a primary reason why intrusions...
The modern enterprise is relentlessly challenged by the number of insider-related variables and risk factors when building an enterprise security defense. Even with an established program, factors like technological innovation, shifting business priorities and public discourse can quickly force the need to re-examine...
There has been so much hype around AI that seeing concrete examples of how the use of this technology can impact real world problems is often lost in the noise. This document takes a look at three scenarios from the Verizon Data Breach Report that have happened at specific organizations and details how AI can be...
Companies want to understand and implement threat hunting practices, but in reality - and with a limited budget - it is not always feasible to do so in-house, given the demand for resources and skills. That's where managed threat hunting enters. More often, organizations want to use that funding to shore up defense...
"Threat intelligence" has to be one of the most ill-defined and overused terms in cybersecurity today. With the market estimated to reach as much as $9 billion by 2020, the process of selecting the right threat intelligence solution to fit an organization's unique needs should be straightforward. Yet while business...
This survey report reveals that for many organizations, threat hunting is still new and poorly defined from a process and organizational standpoint. Most are still reacting to alerts and incidents instead of proactively seeking out the threats.
While the act of threat hunting cannot be fully automated, it heavily...
There is greater awareness to the proliferation of mobile threats, and yet many organizations still underestimate their own vulnerabilities. Brian Duckering of Symantec discusses the rise and maturity of mobile threat defense.
There is greater awareness to the proliferation of mobile threats, and yet many organizations still underestimate their own vulnerabilities.
Mobile security should be taken just as seriously - if not more so - as traditional endpoints. Every employee behind a desktop computer also has at least one mobile device...
Businesses MUST address the proliferation of mobile devices in the workplace, whether authorized or not. For every laptop, there is a mobile phone, literally doubling the attack surface for hackers to breach your business and cause harm to you and/or your customers. While protection for traditional devices has long...
Increasingly, threat hunting is a practice that enterprises want to understand and implement. But it is not always feasible to do so in-house, given the demand for resources and skills. That's where managed threat hunting enters.
Companies want to be able to build out threat hunting practices, but in reality - with...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.