Don't second guess. Go with experience.

Blog

Uncategorized

Categories

Archives

Factor in AI when working with SIEM.

Artificial Intelligence Is Only As Good As Our Input

Much of the intelligence and SIEM tools cybersecurity and IT pros use day in and day out have a machine learning component that falls into the category of Artificial Intelligence (AI). For example, it could be argued that the AlienVault Unified Security Management (USM) product, with SIEM capabilities, operates with some AI characteristics and capabilities.…

Read More

What Is Cyber Intelligence?

In February 2002, Donald Rumsfeld, then US Secretary of State for Defense, stated at a briefing, “There are known knowns. There are things we know that we know. There are known unknowns. That is to say, there are things that we now know we don’t know. But there are also unknown unknowns. There are things…

Read More

Protect 2020: Now Is the Time to Secure the Election

We may feel that there is still time to prepare for the 2020 election, but cyberattackers are already actively seeking ways to undermine it. Election attacks typically start long before the actual election. Threat actors seek to infiltrate systems by stealing valuable login credentials through methods like phishing or purchasing stolen data in underground markets,…

Read More
IoT-Smart-Devices

BOTNETS: When IOT Goes Rogue

WHAT ARE IoT DEVICES? In a world thriving on interconnectivity, one big development over the last 10 years is not just the invention of IoT devices, but the availability of those devices.  Not only do they extend internet connectivity beyond the standard desktop or laptop, they’ve been developed to touch every aspect of our lives.…

Read More
Locks protecting a gate to portray the idea of SIEM

What Is SIEM And How To Choose The Right Tool

Understanding, Selecting and Using SIEM One of the hurdles faced by organizations regarding cybersecurity isn’t just establishing protective measures. It’s also managing the sheer deluge of information regarding security events occurring on any given day. Because of the volume and complexity, businesses often seek out options to simplify the process. One of those options is…

Read More
zero day attack occurring to a computer software code

Understanding Zero-Day Attacks

The Rise of Zero-Day Exploits and Attacks Part of forming an effective cybersecurity strategy means understanding the threats that can impact your organization. One form of threat that is on the rise and steadily evolving in complexity and danger is a zero-day attack, also referred to as a zero-day exploit. The name of these malicious…

Read More
Improve cybersecurity this year

Is Better Cybersecurity Part of Your 2019 New Year’s Resolutions? It Should Be.

Just as people launch resolutions at the beginning of a new year, it’s also a great time to review your company’s status—were you fiscally responsible, financially successful, how did your team work together this year? In our day-and-age one of the most important questions a company can ask is “how does our cybersecurity measure up?”…

Read More
Cyber Intel Is Key to Election Security

The Role of Cyber Intelligence in Election Security

Elections. Quite the hot-button issue these days. Step into the proverbial public square, or be invited behind closed doors, and you’ll find elections are being discussed with fervor. With all the extra attention, it’s important to note that more eyes will be on security than ever – and the scrutiny won’t just be coming from…

Read More
Email Phishing is a common attack vector.

The Attack Vectors to Know – Video Blog

When it comes to intelligence topics, a subject that people often hear about is attack vectors. Yet, attack vector is such a broad cybersecurity industry term. Most people may not really know what it means, and more importantly, what it means to them and why they need to be aware of the different types of…

Read More
Pattern Recognition

Pattern Recognition, Analysis and Profiling for Investigations and Threat Hunting

We’ve received a few questions about what we cover in our Pattern Recognition, Analysis and Profiling class. If you are a cyber investigator or analyst – or any role that requires you to extract meaningful information for threat hunting or investigative activities – understanding how to efficiently and effectively identify patterns in huge volumes of data and…

Read More

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.