AI, defense, cybersecurity,

Detecting the Impossible: Serverless C2 in the Cloud

There are certain sophisticated threat behaviors that are generally considered “impossible” to detect on the network, which are both tedious and challenging for security teams to protect against. These include the use of encryption by attackers, fileless malware that exploits applications commonly used for justified activity to execute malicious code, ... Read More
Security Boulevard
location data

Is NTA Just Another Kind of IDS?

Earlier last year, Anton Chuvakin of Gartner posted a question I’ve spent the past few years focused on. Actually, I’ve focused on it since working in the Network Security Wizards office on the Dragon IDS back in Y2K, back when it was called Y2K. In the post, Anton posits the ... Read More
Security Boulevard