[CrowdStrike + Okta + Elastic + D3 Smart SOAR ]  Valid Account Threats

The 10 Most Common MITRE Tactics & Techniques of 2023

SOAR solutions create a centralized queue of all incidents going on in a security team’s environment. Endpoint, SIEM, email, behavior, and network alerts are all collected inside of a holistic SOAR solution ...
MITRE ATT&CK® Framework

What Are MITRE ATT&CK and MITRE D3FEND?

Ever wish you had a crystal ball for cyber threats? Meet MITRE ATT&CK and MITRE D3FEND, your digital fortune-tellers. In a fast-moving threat landscape, staying ahead of your adversaries is crucial. MITRE ...

The Psychology of Insider Risk Management

In the second episode of Conversations from the Inside: The Psychology of Insider Risk Management: Time and Place Matters, renowned intelligence and security expert Christopher Burgess sat down with MITRE’s Chief Scientist ...

Building a Human-Centric Insider Risk Program | Three Experts Weight In

Building a human-centric insider risk program has become a key priority for most federal and critical infrastructure organizations. But how do you get started? How do you do it justice? There are ...

Busted: Misconceptions on Insider Risk Programs

Insider risk management is gaining momentum, as organizations increasingly accept that cybersecurity is a human challenge that requires a human solution. The data shows that humans are a common factor in cybersecurity ...

Insider Risk: When Business Gets Personal

In an ideal world, there is a clear delineation of where personal and professional engagements take place: anything business related transpires on corporate devices on company time, while anything considered personal occurs ...
The Undeniable Effectiveness of Password Spray

The Undeniable Effectiveness of Password Spray

One of the most effective techniques NodeZero employs for initial access is password spray. It’s a primitive technique, basically guessing passwords, and when it works it feels like magic. Yet we see ...
AI, defense, cybersecurity,

MITRE ATT&CK Framework Explained: Why it Matters

We all know that cyberthreats have become more frequent, stealthier and more sophisticated. What’s more, the traditional, reactive approach to detecting threats by hunting indicators of compromise (IoCs) using markers like IP ...
Security Boulevard
APIs complexity cybersecurity vulnerability-resignation

4 Steps to Getting CVEs Published

| | CVE, MITRE, vulnerability, zero-day
(Featuring research from Trustwave SpiderLabs researchers Adeeb Shah and Bobby Cooke) One of the most frustrating problems as a newcomer to the security research field can be trying to navigate the process ...
Security Boulevard

Part 2: Your Security Operations Cheat Sheet for Cloud Logs (And How to Tie Them to the MITRE ATT&CK Framework)

Cloud adoption is growing at astonishing rates, and more than 90 percent of organizations are now operating a multi-cloud strategy.... The post Part 2: Your Security Operations Cheat Sheet for Cloud Logs ...