detection and response
Frameworks for DE-Friendly CTI (Part 5)
This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#5 in the series), we will build a quick “framework-lite” for ...
Threat-informed or Threat-owned? Classic Practices Will Probably Save You!
So, if you are too busy to read our amazing (duh!) new blog “Revisiting Traditional Security Advice for Modern Threats”, here are the key ideas from it.At some point, a “pre-owned” (compromised before ...
New Report “State of Cloud Threat Detection and Response”
Cloud D&R Report (2023)One of the mysteries of detection and response (D&R) is about how companies really approach D&R in the public cloud. So we did a survey focused on this, and we ...
Revisiting Phishing Simulations
This post was written by Matt Hand and the rest of the SpecterOps team.OverviewSpecterOps is a huge proponent of the “assumed breach” red team execution model where we begin the engagement with ...
What is XDR vs EDR vs MDR? Extended Detection and Response Explained
EDR and XDR: What Do They Do? Dwell time refers to the length of time an attacker is able to roam free on your network… The post What is XDR vs EDR ...
Introducing NetWitness Cloud SIEM: All the Power Without the IT
NetWitness is the security and compliance choice for of the world?s largest, most complex and most security-conscious organizations. NetWitness Cloud SIEM makes it easy for organizations of any size and type to ...
The Security Benefits of Integrating Identity with Detection & Response
Identity Management – Playing a Key Role in Organization Security Participating in Oktane21, Okta’s annual conference, made it clear that this year, more than ever, that identity management takes a critical role ...
Protect Your Network
How do you help your SOC deal with attacks that are well-hidden, already inside the corporate firewall, and have bypassed perimeter-based controls? Leveraging network detection and response, security analyst can reduce mean-time-to-detection ...
Managed Detection and Response: Hype or Hope?
The post Managed Detection and Response: Hype or Hope? appeared first on Delta Risk ...
Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments
The post Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments appeared first on Delta Risk ...