by Ryan Trost | Jan 14, 2020 | Blog, Cybersecurity, Threat Intelligence
Cyber Predictions for 2020 POSTED BY RYAN TROST As the 2020 budget meetings come and go – teams are forced to assess their current defenses by analyzing their historical attacks in order to anticipate/predict future attack trends. A difficult but worthwhile...
by Liz Bush | Jan 7, 2020 | Blog, Cybersecurity, Threat Intelligence
Threat Hunting: Survey Results from the Trenches – Part 3 POSTED BY LIZ BUSH In Part 2 of this series we talked about common methodologies for threat hunting. Now, let’s look at how organizations are executing threat hunting – specifically the investments they’re...
by Liz Bush | Dec 17, 2019 | Blog, Cybersecurity, Threat Intelligence
Threat Hunting: Survey Results from the Trenches – Part 2 POSTED BY LIZ BUSH In Part 1 of this series, I shared the state of threat hunting as measured by SANS in their 2019 survey of threat hunters and security managers from various organizations around the globe....
by Liz Bush | Dec 10, 2019 | Blog, Cybersecurity, Threat Intelligence
Threat Hunting: Survey Results from the Trenches – Part 1 POSTED BY LIZ BUSH SANS recently published their 2019 Threat Hunting Survey in which they explore the differing needs of new and experienced threat hunters. In this three-part blog series, I provide an overview...
by Ryan Trost | Oct 22, 2019 | Blog, Cybersecurity, Threat Intelligence
Maintaining Control within Incident Response Investigations - Part 3 POSTED BY RYAN TROST Security teams continuously look for ways to mature their process and improve their incident response efforts. Incident pruning should be one of the first activities to consider,...
by Ryan Trost | Oct 15, 2019 | Blog, Cybersecurity, Threat Intelligence
Maintaining Control within Incident Response Investigations - Part 2 POSTED BY RYAN TROST In Part 1 of this series I landed on a recalibrated definition of incident pruning that addresses the nuances of incident deadheading and incident pruning. Now, I want to...