Threat data feeds can help organizations strengthen their cybersecurity posture, according to a report from the Ponemon Institute. As cyberthreats proliferate, many organizations are using threat feeds with insights from domain name system (DNS) data t…Read More Challenges and benefits of using threat data feeds
On average, enterprises maintain 19 different security tools, with only 22% of such tools serving as vital to primary security objectives, a ReliaQuest survey reveals. The report, which surveyed 400 IT and security decision makers at companies with mor…Read More Rapid increase in security tools causing alert fatigue and burn out
Alert overload still plagues the cybersecurity industry, according to Critical Start. Forty-seven percent of respondents reported personally investigating 10 to 20 alerts each day, a 12% increase from 2019. Moreover, 25% of respondents said they invest…Read More Alert overload still plagues cybersecurity industry
What is CIEM? Among the many changes of 2020, Gartner added a new category: cloud infrastructure entitlement management (CIEM). While CIEM may sound similar to SIEM (security information and event management), the two security solutions are not the sam…Read More Why do enterprise SOC teams need CIEM now?
What is your organization’s readiness for the emerging eXtended Detection Response (XDR) technology? McAfee just released the first iteration of this technology, MVISION XDR. As XDR capabilities become available, organizations need to think through how to embrace the new security operations technology destined to empower detection and response capabilities. XDR is a journey for people and organizations. The cool thing about […]Read More Are You Ready for XDR?
Which tactics and techniques are cyber attackers favoring? vFeed has compiled a list of the Top 10 Most Used MITRE ATT&CK Tactics and Techniques to help security teams focus their defenses more effectively. MITRE ATT&CK helps understand attac…Read More Top 10 most used MITRE ATT&CK tactics and techniques
SIEM, we need to talk! Albert Einstein once said, “We cannot solve our problems with the same thinking we used when we created them”. Security vendors have spent the last two decades providing more of the same orchestration, detection, and response capabilities, while promising different results. And as the old adage goes, doing the same thing over and over again whilst […]Read More XDR – Please Explain?
1. Attackers have a plan, with clear objectives and outcomes in mind. Do you have one? Clearly this was a motivated and patient adversary. They spent many months in the planning and execution of an attack that was not incredibly sophisticated in its tactics, but rather used multiple semi-novel attack methods combined with persistent, stealthy […]
The post 6 Best Practices for SecOps in the Wake of the Sunburst Threat Campaign appeared first on McAfee Blogs.Read More 6 Best Practices for SecOps in the Wake of the Sunburst Threat Campaign
This blog is part of our SOCwise series where we’ll be digging into all things related to SecOps from a practitioner’s point of view, helping us enable defenders to both build context and confidence in what they do. Although there’s been a lot of chatter about supply chain attacks, we’re going to bring you a slightly different […]
The post SOCwise Series: Practical Considerations on SUNBURST appeared first on McAfee Blogs.Read More SOCwise Series: Practical Considerations on SUNBURST
XDR (eXtended Detection and Response) is a cybersecurity acronym being used by most vendors today. It is not a new strategy. It’s been around for a while but the journey for customers and vendors has been slow for many reasons. For McAfee, XDR has been integral to our vision, strategy and design philosophy that has […]Read More The Road to XDR
eXtended Detection & Response (XDR) has become an industry buzzword promising to take detection and response to new heights and improving security operations effectiveness. Not only are customers and vendors behind this but industry groups like Open Cybersecurity Alliance (OCA) share this same goal and there are some open projects to leverage for this effort. […]Read More How OCA Empowers Your XDR Journey
Core to any organization is managing cyber risk with a security operations function whether it be in-house or outsourced. McAfee has been and continues their commitment to protecting cyber assets. We are dedicated to empowering security operations and with this dedication comes expertise and passion. Introducing SOCwise a monthly series of blogs, podcasts and talks […]
The post SOCwise: A Security Operation Center (SOC) Resource to Bookmark appeared first on McAfee Blogs.Read More SOCwise: A Security Operation Center (SOC) Resource to Bookmark
Detrimental lies are not new. Even misleading headlines and text can fool a reader. However, the ability to alter reality has taken a leap forward with “deepfake” technology which allows for the creation of images and videos of real people saying and doing things they never said or did. Deep learning techniques are escalating the […]
The post The Deepfakes Lab: Detecting & Defending Against Deepfakes with Advanced AI appeared first on McAfee Blogs.Read More The Deepfakes Lab: Detecting & Defending Against Deepfakes with Advanced AI