Swiss Army knife malware

Adaptable ‘Swiss Army Knife’ Malware a Growing Threat

There is a worrying rise in multipurpose malware, which can perform a variety of malicious actions and is adept at evasion, lateral movement and data encryption. These were among the findings of ...
Security Boulevard

Making Sense of the 2022 Gartner Critical Capabilities For SIEM

| | Blog, SIEM, threat detection
As organizations evaluate or re-evaluate their needs in improving security operations, the SIEM must be... The post Making Sense of the 2022 Gartner Critical Capabilities For SIEM appeared first on Gurucul ...
resources security challenges tools breach API attacker Radware Report Sees Major Spike in DDoS Attacks

The State of Threat Detection and Response

Security teams shoulder the enormous responsibility of protecting their organization from attacks that could compromise data, ruin brand trust and result in costly damages. In my more than ten years as a ...
Security Boulevard

Podcast: Optimizing Cyber Threat Detection & Response

Mark Shriner, Secure Talk Podcast host interviews Sanjay Raja, Gurucul VP of Product Marketing and... The post Podcast: Optimizing Cyber Threat Detection & Response appeared first on Gurucul ...
Modernizing Phoenix's Cybersecurity to Combat Nation-State Attacks

Video: Modernizing Phoenix’s Cybersecurity to Combat Nation-State Attacks

Shannon Lawson, CISO for the City of Phoenix, and Geoffrey Coulehan, Head of Sales for MixMode recently joined forces for a fireside chat at the Evanta CISO Summit in Phoenix, AZ. Lawson ...
Webinar On Demand: Stopping Novel Attacks – Secure Your Business Against Unknown Threats

Webinar On Demand: Stopping Novel Attacks – Secure Your Business Against Unknown Threats

Hosted by Mark Ehr, Senior Consulting Analyst for 451 Research Advisors and Igor Mezic, Chief Scientist and CTO for MixMode on Tuesday, November 1st at 1pm EST / 10am PST, they will ...
Why Your Security Data Lake Project Will … Well, Actually …

Why Your Security Data Lake Project Will … Well, Actually …

Why Your Security Data Lake Project Will … Well, Actually …Long story why but I decided to revisit my 2018 blog titled “Why Your Security Data Lake Project Will FAIL!” That post was very ...
451 Research Finds Self-Learning Technology to Address Cybersecurity Blind Spots and Reduce Analyst Burnout

451 Research Finds Self-Learning Technology to Address Cybersecurity Blind Spots and Reduce Analyst Burnout

In the report, 451 Research explains why security analytics needs to include advanced Third-Wave AI, which autonomously learns normal behavior and adapts to constantly changing network environments, to address the next generation ...

SaaS Eliminates Barriers to Applying Security Controls to Your Entire AWS and Azure Data Repository

Businesses today widely regard data as “the new oil,” the most valuable resource on earth. At the same time, we are in the midst of the most dynamic IT landscape in history ...
On Trust and Transparency in Detection

On Trust and Transparency in Detection

| | Detection, threat detection
This blog / mini-paper is written jointly with Oliver Rochford.When we detect threats we expect to know what we are detecting. Sounds painfully obvious, right? But it is very clear to us ...