MITRE ATT&CK is built around the premise that the best way to find attacks is by their behaviors. It provides a guide on how to manually track 100s to find attacks at various stages in the kill chain (lifespan). It’s been lauded as the best way to find attacks across the industry from every...
Tags: cyber attack, cybersecurity, featured
In this first article in a three-part series, we look at machine learning and artificial intelligence and show how it can help...
Tags: cyber attack, cybersecurity
Next generation intrusion detection systems (IDS) are now integrating detection, investigation and response capabilities. It’s a...
Tags: cybersecurity, intrusion detection
As an IT security professional, you must be hyper-aware of all the possible types of cyber attacks to your network and your...
Tags: cyber attack, cybersecurity, ransomware,
A closer look at ransomware: what is it, why is it so devastating, and why aren’t we doing a better job at preventing it? This...
Tags: cyber attack, cybersecurity, data protection,
How did the recent Colonial Pipeline cyber attack happen? What could have been done to prevent it? A closer look at the most...
Tags: cyber attack, cybersecurity, ransomware
While past blogs focused on the initial cyberattack involving Microsoft Exchange Server, this follow-up article takes a much...
Tags: cyber attack, data breach, cybersecurity,
Most everyone agrees that 2020 was a loss-leader of a year.
Tags: cyber attack, data breach, cybersecurity,
Today at GTC NVIDIA announced their NVIDIA Morpheus cybersecurity application framework, as well as the general availability of...
Tags: cyber attack, cybersecurity
It’s been approximately 100 days since the disclosure of the attack on the SolarWinds Orion platform, and we are in a better...
Tags: cyber attack, data breach, cybersecurity,
Enter your email address to subscribe to this blog and receive notifications of new posts by email.