Don't second guess. Go with experience.

Blog

Threat Intelligence

Categories

Archives

Factor in AI when working with SIEM.

Artificial Intelligence Is Only As Good As Our Input

Much of the intelligence and SIEM tools cybersecurity and IT pros use day in and day out have a machine learning component that falls into the category of Artificial Intelligence (AI). For example, it could be argued that the AlienVault Unified Security Management (USM) product, with SIEM capabilities, operates with some AI characteristics and capabilities.…

Read More

Pattern Recognition, Analysis and Profiling. Is it for you?

Photo by rawpixel on Unsplash by Monty St John Our Pattern Recognition, Analysis and Profiling class tends to throw people when they see the name. In their head they ponder the title and think about pattern matching. After a dance of Sudoku, logic puzzles, and crosswords pass by their internal sensor, they give it a pass to move…

Read More
Threat Intelligence and Uncertainty

What Is the Fog of War and What Does It Have to Do With Threat Intelligence?

The Fog of War is a military concept but has its place in non-military analysis as well, particularly in threat intelligence.  It is about uncertainty in situational awareness, and whether you are performing business forecasting or trying to figure out if the latest phishing you received is a threat, its place in analysis is relevant.…

Read More
Reduce the Security Risks of Cloud Storage

Cloud Storage: 5 Ways to Reduce Security Risks

Cloud computing offers unprecendented convenience, not to mention scalability and cost efficiencies. Yet, it’s incredibly important that organizations ensure they don’t sacrifice security for the benefits of cloud applications, servers and networks.  While securing the cloud can be a multi-faceted prospect, there are five main things to keep in mind as you defend your cloud…

Read More
Email Phishing is a common attack vector.

The Attack Vectors to Know – Video Blog

When it comes to intelligence topics, a subject that people often hear about is attack vectors. Yet, attack vector is such a broad cybersecurity industry term. Most people may not really know what it means, and more importantly, what it means to them and why they need to be aware of the different types of…

Read More
Pattern Recognition

Pattern Recognition, Analysis and Profiling for Investigations and Threat Hunting

We’ve received a few questions about what we cover in our Pattern Recognition, Analysis and Profiling class. If you are a cyber investigator or analyst – or any role that requires you to extract meaningful information for threat hunting or investigative activities – understanding how to efficiently and effectively identify patterns in huge volumes of data and…

Read More
Photo by Helloquence on Unsplash

Expanding Your Election Security Knowledge

Election security is more than understanding the technology, which on its own can be complex and at times confusing; it also includes understanding how to do things securely at every step of the election process. Many of the concerns during the Midterm Elections were amplified by the atmosphere of uncertainty around potential threats, confusion over…

Read More
Elections Cybersecurity Protects Voter Choice

7 Rules of Cybersecurity Threat Hunting

by Monty St John Threat hunting can and should be a part of your cybersecurity efforts, but the idea of starting a threat hunting and monitoring program can be intimidating. Building a portfolio of threats to watch and determining how to manage the risks they pose to your organization is usually confusing, often misleading and…

Read More
CyberDefenses - Defenses Protection

Your Incident Response Plan Depends on Knowing Your Attack Vectors

by Brian Engle, CISO Similar to businesses, attackers have goals that they set out to achieve. Depending on the attacker, the goals may vary, but ultimately to accomplish objectives an attacker has to utilize an attack vector to break through defenses. Network defenses and cybersecurity protections are the starting point for closing up potential attack…

Read More

DefCon’s Voting Village: Results and Impact

  by Monty St John It’s been a few weeks since DefCon took place in Las Vegas, but the buzz from this year’s event can still be heard echoing throughout cybersecurity circles, particularly elections cybersecurity. Hackers were out in full force to try their hand at breaking into election machines through DefCon’s “Voting Village” this…

Read More

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.