Training Ideas for Machine Learning in Security
If you’ve been evaluating new security tools, you’ve undoubtedly heard machine learning (ML) touted many times. It is fast becoming the backbone of all modern software, security systems included. Thus, it appears that resistance is futile, as some version of Skynet is likely inevitable—although which version ultimately manifests depends entirely ... Read More
CIPHER Security Named to 2018 MSSP Alert Top 100 Managed Security Services Providers List
Second Annual List Honors Leading MSSPs and Cyber Security Companies that Safeguard Customers’ Digital Assets MSSP Alert, published by After Nines Inc, has named CIPHER Security to the Top 100 MSSPs list for 2018. The list and research identify and honor the top 100 managed security services providers (MSSPs) that ... Read More
Placing More Importance on Data Security
The amount of data companies use and store has become so large and cumbersome that it is more difficult to correlate and control. Organizations are too often careless in their behavior surrounding data. This leads to data seeping out of the company in different ways. Malware is still a threat, ... Read More
Top SIEM Use Case Examples
Recent research indicates that up to 70 or 80% of SIEM deployments are driven by PCI DSS or other regulations. The following table shows a few example regulations that affect SIEM and log management ... Read More
Building Your Future Business with a SOC
Just as you wouldn’t give your house keys to someone you just met, organizations don’t want to do business with those they don’t trust. As digital transformation becomes the norm, it provides opportunities for growth and exposes vulnerabilities with the potential to breach the trust that businesses work so hard ... Read More
Quick Tips for Developing an IR Plan
According to a cybersecurity resilience study, 77 percent of organizations surveyed lack proper incident response plans, while 69 percent report insufficient funding for cyber resiliency. Where does your organization stand on this critical issue? ... Read More
Have Your Analysts See The Full Cyber Kill Chain
Just about every cybersecurity professional is familiar with the cyber kill chain, a set of steps bad actors typically go through with the end goal of stealing valuable data. Reconnaissance. Weaponization. Delivery. Exploitation. Installation. Command and Control. Actions on Objective.Sound familiar? The goal of cyber teams is to detect bad ... Read More
How To Create a Layered Security Defense Strategy
Take the time to learn about your assets. You'll be able to layer in multiple prevention and detection solutions and have a highly effective security architecture ... Read More
Building Enterprise-Class Threat Intelligence
The ever-expanding range and diversity of cyber threats make it difficult for organizations to prioritize their offensive and defensive strategies against attackers. From malware, ransomware, and other attacks coming from the outside, to insider threats and system vulnerabilities from within, today's expanded attack surfaces cut across the whole enterprise landscape ... Read More
The Top Security Tools to Use Across the Cyber Kill Chain
The cyber kill chain, a military-inspired cybersecurity concept developed by Lockheed Martin, can be used to build a foundation for cybersecurity across your organization. The cyber kill chain essentially breaks down the phases an attacker goes through to penetrate your network and leave undetected with data ... Read More