
Using MITRE ATT&CK in Threat Hunting and Detection
Explore the five common techniques for threat detection and hunting. Discover the innovative ways MITRE ATT&CK can help your organisation assess and mitigate threats
Explore the five common techniques for threat detection and hunting. Discover the innovative ways MITRE ATT&CK can help your organisation assess and mitigate threats
An IDC report exploring the growing importance of User and Entity Behavior Analytics (UEBA) to thwart cyber attracts. Explore how LogRythm UEBA solutions can help your organisation’s security operations to scale to defeat evolving threats. Read about: FutureScape Security Trends in Asia Pacific An in-depth analytics on the wide spectrum of cyber attacks Leveraging UEBA ...
There are some big changes coming next year that will affect the finance industry. The concept of GDPR, PSD2 and other acronyms might seem a bit daunting, but they don’t have to be if you’re prepared. This webinar, with Adam Brady, Sales Engineer from LogRhythm, will walk us through what these changes mean for you ...
With the growth of the IoT, we’re going to be seeing the convergence of Operations Technology and IT Teams. When you add that to BYOD, this presents considerable challenges for the corporate security officer. How does the enterprise maintain its corporate security policy in the face of all these challenges? Martin Cook, Solutions Architect from ...
You can lessen your organisation’s risk of experiencing a damaging cyber incident or data breach by investing in effective Threat Lifecycle Management. Although internal and external threats will exist, the key to managing their impact within your environment and reducing the likelihood of costly consequences is through faster detection and response capabilities. In this white ...
The external threat is one of the most high-profile risks that organisations face. Representing more than 80 percent of attacks today, external attackers look to take advantage of network and user weakness via malware, phishing, and advanced persistent threats (APT) . Key indicators of a compromise can be found by analysing the network traffic from ...
The incoming General Data Protection Regulation will address the gap and make EU privacy and data laws fit for purpose in the digital age-harmonising data protection laws in the EU. The EU believes common, shared laws will bring better transparency to help support the rights of individuals and grow the digital economy. In this paper, ...
This report analyzes the current state of cyber security, including the perceptions and concerns of cyber security professionals. The findings of this report are divided into four sections, as follows: Section 1: Current Security Posture Section 2: Perceptions and Concerns Section 3: Attack Surface Reduction Section 4: Future Plans
In my 10 years as the CISO for the largest information enterprise in the world, the U.S. Department of Defense, we realized after numerous cyber incidents that leadership commitment was severely lacking and that victim organizations did not possess the tools, processes, staff, or mindset necessary to detect and respond to advanced intruders. Accordingly, we ...
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at ...