Training Ideas for Machine Learning in Security

| | Machine Learning security
If you’ve been evaluating new security tools, you’ve undoubtedly heard machine learning (ML) touted many times. It is fast becoming the backbone of all modern software, security systems included. Thus, it appears that resistance is futile, as some version of Skynet is likely inevitable—although which version ultimately manifests depends entirely ... Read More

CIPHER Security Named to 2018 MSSP Alert Top 100 Managed Security Services Providers List

| | awards
Second Annual List Honors Leading MSSPs and Cyber Security Companies that Safeguard Customers’ Digital Assets MSSP Alert, published by After Nines Inc, has named CIPHER Security to the Top 100 MSSPs list for 2018. The list and research identify and honor the top 100 managed security services providers (MSSPs) that ... Read More

Placing More Importance on Data Security

|
The amount of data companies use and store has become so large and cumbersome that it is more difficult to correlate and control. Organizations are too often careless in their behavior surrounding data. This leads to data seeping out of the company in different ways. Malware is still a threat, ... Read More

Top SIEM Use Case Examples

| | SIEM
Recent research indicates that up to 70 or 80% of SIEM deployments are driven by PCI DSS or other regulations. The following table shows a few example regulations that affect SIEM and log management ... Read More

Building Your Future Business with a SOC

|
Just as you wouldn’t give your house keys to someone you just met, organizations don’t want to do business with those they don’t trust. As digital transformation becomes the norm, it provides opportunities for growth and exposes vulnerabilities with the potential to breach the trust that businesses work so hard ... Read More

Quick Tips for Developing an IR Plan

|
According to a cybersecurity resilience study, 77 percent of organizations surveyed lack proper incident response plans, while 69 percent report insufficient funding for cyber resiliency. Where does your organization stand on this critical issue? ... Read More

Have Your Analysts See The Full Cyber Kill Chain

|
Just about every cybersecurity professional is familiar with the cyber kill chain, a set of steps bad actors typically go through with the end goal of stealing valuable data. Reconnaissance. Weaponization. Delivery. Exploitation. Installation. Command and Control. Actions on Objective.Sound familiar? The goal of cyber teams is to detect bad ... Read More

How To Create a Layered Security Defense Strategy

| | cybersecurity essentials
Take the time to learn about your assets. You'll be able to layer in multiple prevention and detection solutions and have a highly effective security architecture ... Read More

Building Enterprise-Class Threat Intelligence

| | Threat Intelligence
The ever-expanding range and diversity of cyber threats make it difficult for organizations to prioritize their offensive and defensive strategies against attackers. From malware, ransomware, and other attacks coming from the outside, to insider threats and system vulnerabilities from within, today's expanded attack surfaces cut across the whole enterprise landscape ... Read More

The Top Security Tools to Use Across the Cyber Kill Chain

The cyber kill chain, a military-inspired cybersecurity concept developed by Lockheed Martin, can be used to build a foundation for cybersecurity across your organization. The cyber kill chain essentially breaks down the phases an attacker goes through to penetrate your network and leave undetected with data ... Read More