Jayesh Kalro: To Manage Vulnerabilities Effectively, Define Business Priorities and Identify Critical Assets
Businesses must first define their priorities in order to effectively manage vulnerabilities in their environment. Automation can provide businesses with a powerful way to speed up their response time and react to threats with greater agility. Understanding active...
Lester Godsey: More Data Makes the Behavioral Analysis More Accurate
SOC leaders should look beyond just log data for anomalies. Threat insights can be found in data can comes from many sources, and it is not always structured. The ultimate goal is being able to respond quickly to detected threats, because having all the insight does...
Joseph Smith: Endpoints Are Part of One Giant, Integrated System
Given the unlimited time and resources available to determined attackers, an active security strategy is the better approach against an enemy that has a built-in advantage. A security strategy that combines activity monitoring, automated triggers, and limited endpoint...
Paul Heffernan: Moving from File Locking to Behavior Locking
With malware variants being generated far faster than any signature-based security solution can possibly keep up with, signature detection is not enough. Machine learning and artificial intelligence are critical tools for early threat detection, but they still require...
Kevin McLaughlin: Bimodality and Digitization Can Help You Detect the Unknown Threat
In addition to having the right tools, organizations need to build threat-hunting teams. Threat hunting is a different skill set than that of a traditional analyst. When working with an MDR vendor, spend time teaching them your environment, your policies and process,...
Jason Kinder: Active Threat Management Requires New Tools and Skills
Modern multi-vector threats are specifically designed to bypass traditional defenses, necessitating more aggressive threat-hunting strategies. Active threat management must be a continuous activity because of ever-changing network environments and the constantly...
Dr. Rebecca Wynn: ‘Set and Forget’ Is Lazy Security
“Set and forget” is a lazy approach to endpoint security that provides an opening for attacks traditional defenses won’t detect. Active endpoint security requires investing in tools, learning how to use them effectively, and retraining security teams to change their...
Todd Spight: A Security Practice Needs to Demonstrate Continuous Improvement
Using predictive threat detection that involves scoring anomaly risk is an key element of active endpoint security. Active threat detection requires new skill sets, because you are no longer waiting for something to happen. Teams need to understand the possibilities...
Hemanta Swain: Quick Response Is the Key
Although active endpoint security makes it possible to identify unusual activities more quickly, it involves analyzing far more data than could be done manually. The technology’s ability to rapidly correlate and analyze data, and visualize alerts, makes it useful to a...
Katrina Biscay: Broaden the Analytical Skills within Your SOC
Many companies run behavior-analysis tools with out-of-the-box settings. You need to start out of the box, then you fine-tune it to your environment and your baseline. An established SOC has many of the necessary skills in place, but it needs to adjust its focus so...