Frameworks for DE-Friendly CTI (Part 5)

Frameworks for DE-Friendly CTI (Part 5)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#5 in the series), we will build a quick “framework-lite” for ...
Threat-informed or Threat-owned? Classic Practices Will Probably Save You!

Threat-informed or Threat-owned? Classic Practices Will Probably Save You!

So, if you are too busy to read our amazing (duh!) new blog “Revisiting Traditional Security Advice for Modern Threats”, here are the key ideas from it.At some point, a “pre-owned” (compromised before ...
New Report “State of Cloud
Threat Detection and
Response”

New Report “State of Cloud Threat Detection and Response”

Cloud D&R Report (2023)One of the mysteries of detection and response (D&R) is about how companies really approach D&R in the public cloud. So we did a survey focused on this, and we ...
Revisiting Phishing Simulations

Revisiting Phishing Simulations

This post was written by Matt Hand and the rest of the SpecterOps team.OverviewSpecterOps is a huge proponent of the “assumed breach” red team execution model where we begin the engagement with ...
What is XDR vs EDR vs MDR?  Breaking down Extended Detection and Response

What is XDR vs EDR vs MDR? Extended Detection and Response Explained

EDR and XDR: What Do They Do? Dwell time refers to the length of time an attacker is able to roam free on your network… The post What is XDR vs EDR ...

Introducing NetWitness Cloud SIEM: All the Power Without the IT

NetWitness is the security and compliance choice for of the world?s largest, most complex and most security-conscious organizations. NetWitness Cloud SIEM makes it easy for organizations of any size and type to ...
The Security Benefits of Integrating Identity with Detection & Response

The Security Benefits of Integrating Identity with Detection & Response

Identity Management – Playing a Key Role in Organization Security Participating in Oktane21, Okta’s annual conference, made it clear that this year, more than ever, that identity management takes a critical role ...

Protect Your Network

How do you help your SOC deal with attacks that are well-hidden, already inside the corporate firewall, and have bypassed perimeter-based controls? Leveraging network detection and response, security analyst can reduce mean-time-to-detection ...

Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments

The post Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments appeared first on Delta Risk ...