Mandiant Security Validation Offers Automated Evaluation of Security Controls Against MITRE ATT&CK Framework by Lynn Harrington

Mandiant Security Validation Offers Automated Evaluation of Security Controls Against MITRE ATT&CK Framework by Lynn Harrington

|
Organizations with a continuous controls validation technology aligned with MITRE ATT&CK can accelerate improvements to their detection and prevention capabilities in a safe, effective, repeatable and measurable way ... Read More
Verodin Thanksgiving Event – Guns 'N' Roses – Oracle Arena, Oakland by Brian Contos

Verodin Thanksgiving Event – Guns ‘N’ Roses – Oracle Arena, Oakland by Brian Contos

|
Yesterday we had a pre-Thanksgiving celebration Verodin style in Oakland CA at the Guns N’ Roses “Not in this Lifetime” tour. It was great getting the Verodin team together with friends from Google and other Silicon Valley companies last night to celebrate an absolutely awesome 2017 at Verodin ... Read More
Mandiant Security Effectiveness Report 2020: What You Need to Know NOW About Reconnaissance by Major General Earl Matthews USAF (Ret)

Mandiant Security Effectiveness Report 2020: What You Need to Know NOW About Reconnaissance by Major General Earl Matthews USAF (Ret)

|
In order to protect an organization’s business critical assets, security teams need to think like a cyber adversary, because only by understanding their process can an organization be prepared and prevent an attack or breach before it happens. And the first step is understanding reconnaissance ... Read More
Perception v. Reality: Most Companies are Incorrectly Assuming That They are Alerting, Preventing and Blocking Attacks by Major General Earl Matthews USAF (Ret)

Perception v. Reality: Most Companies are Incorrectly Assuming That They are Alerting, Preventing and Blocking Attacks by Major General Earl Matthews USAF (Ret)

|
Security leaders may assume that they are protected when they're not. They may think they haven't been breached, but they have ... Read More
Paradigm Shift: Mandiant Security Instrumentation Platform and Threat Actor Assurance Module Enable Organizations to Get the Right Data for Cyber Readiness by Lynn Harrington

Paradigm Shift: Mandiant Security Instrumentation Platform and Threat Actor Assurance Module Enable Organizations to Get the Right Data for Cyber Readiness by Lynn Harrington

|
A lot of cyber threat intelligence is not actually intelligence but just information. Often incomplete and difficult to act on ... Read More
5 Steps to Security Validation by Tracey Moon

5 Steps to Security Validation by Tracey Moon

|
In today’s world, cybersecurity is about the need for speed. From security professionals to those in the C-Suite, organizations need to react quickly to reduce detection time and the ability to respond to an attack ... Read More
The Most Surprising Cybersecurity Weaknesses Every CEO Should Know About by Major General Earl Matthews USAF (Ret)

The Most Surprising Cybersecurity Weaknesses Every CEO Should Know About by Major General Earl Matthews USAF (Ret)

|
CEOs need to understand their organizations’ cybersecurity weaknesses and how those weaknesses can detrimentally impact them financially and operationally. As a starting point, here are the most surprising cybersecurity weaknesses that every CEO should know about ... Read More
Operationalize Threat Intelligence with Security Validation to Improve Cyber Defenses by Lynn Harrington

Operationalize Threat Intelligence with Security Validation to Improve Cyber Defenses by Lynn Harrington

|
Organizations can gain a deep understanding of their threat landscape through threat intelligence but often struggle to translate it into meaningful security improvements ... Read More
Mandiant Security Validation integrates its Security Instrumentation Platform with Mandiant’s Leading Threat Intelligence through Threat Actor Assurance Module (TAAM) by Lynn Harrington

Mandiant Security Validation integrates its Security Instrumentation Platform with Mandiant’s Leading Threat Intelligence through Threat Actor Assurance Module (TAAM) by Lynn Harrington

|
TAAM provides organizations the means to operationalize timely, relevant intelligence for continuous cyber security validation to bolster defenses and outmaneuver motivated threat actors ... Read More
Security Effort does not Equal Security Effectiveness: 3 Stats Every CEO Should be Asking Their CISOs About NOW by Major General Earl Matthews USAF (Ret)

Security Effort does not Equal Security Effectiveness: 3 Stats Every CEO Should be Asking Their CISOs About NOW by Major General Earl Matthews USAF (Ret)

|
Without the right tools and resources to continuously measure and monitor controls, security professionals simply do not have the quantitative evidence to know where they have security gaps ... Read More