It’s no secret that intrusion detection systems (IDS) reliance on bi-modal signatures is brittle, easily evaded, and often a cause of unnecessary alerts. After more than 20 years of underwhelming results, it’s time to improve security efficacy, add visibility into east-west traffic, and extend...
It’s no secret that cloud security is important. Rather than jumping into deploying a specific product category to protect your cloud workloads, it’s important to understand key industry trends so that you can better orient your organization and develop the right approach to addressing...
Since 2019, we’ve seen more and more examples of vulnerabilities in cloud assets, sensitive data disclosure, and public cloud environment breaches. Even with these types of security issues, more organizations than ever are moving their data and workloads to the public cloud, building applications...
The market for network intelligence threat analytics (NITA) is growing rapidly—it’s up 18.9% in 2019. As IDC’s Research Director for Security Products Chris Kissel indicates, the common denominator of tools and features NITA tracks to closely align with network detection and response (NDR).
In this...
In the wake of the SolarWinds attack, organizations worked around the clock to understand the full extent of the damage. As security teams went back through historical records, it became clear that most logs were limited or incomplete, which created an issue for narrowing...
Ransomware is a growing and evolving threat that targets organizations of all sizes and industries. As the techniques attackers use are becoming more sophisticated, defense methods must also evolve to match the growing threat
This SANS report defines ransomware, details how it spreads, and offers...