To Detect or Not to Detect, Is that the Question?

Tripwire Enterprise (TE) is at its heart a baselining engine. It’s been built to take information, create a baseline of it, and show when that baseline has changed. (It’s called a “version” ...

A Cure for a Disheartened Cybersecurity Professional

Data breaches and ransomware attacks aren’t just still occurring. They’re also becoming more frequent. According to ZDNet, the number of ransomware attacks detected and blocked by one security firm grew 715% year-over-year ...

Spot the Ball & Security Detection Games

When I was younger, and printed newspapers were a more common household purchase, I remember fondly watching my mother play a game called “Spot the Ball.” For those of you not familiar ...
Pingback: ICMP Tunneling Malware

Pingback: ICMP Tunneling Malware

By Keith Jones, Anthony Kasza and Ben Reardon, Security Researchers, Corelight Introduction Recently, Trustwave reported on a new malware family which they discovered during a breach investigation. The backdoor, dubbed Pingback, executes ...
What Are Your NOT Detecting?

What Are Your NOT Detecting?

What are you not detecting?OK, what threats are you NOT detecting?Still didn’t help?What I mean here is: are you thinking about these:Threats that you don’t need to detect due to your risk profile, your ...

NetWitness ? A Brief History of an Iconic Threat Detection & Response Platform

The history of NetWitness reflects the continuous evolution of threats and bad actors. Begun as a government intelligence research project, NetWitness has earned a reputation as the most powerful detection and forensics ...
5 Modern Security Operations Trends That Will Dominate 2021 and Beyond

5 Modern Security Operations Trends That Will Dominate 2021 and Beyond

The turning of the annual calendar was celebrated globally in a way not seen in a generation, but 2021 will... The post 5 Modern Security Operations Trends That Will Dominate 2021 and ...
Role of Context in Threat Detection

Role of Context in Threat Detection

I got into a very insightful debate with somebody who will remain nameless in the beginning of this post, but will perhaps be revealed later. The debate focused on the role of ...
Why is Threat Detection Hard?

Why is Threat Detection Hard?

While creating a recent presentation, I needed a slide on “threat detection is hard.” And it got me thinking, why is threat detection so hard for so many organizations today? We can ...
Chronicle Detect Demo Video

Chronicle Detect is Here

A lot of people ask me how Chronicle is doing inside Google Cloud (TLDR: doing well), and I wanted to share some good news. I also wanted to reveal some of our ...