Time to Get Smarter About Threat Intel
Dark Reading Videos | 8/22/2019 | Bad actors move faster than threat intelligence feeds and the infosec pros who monitor them, notes Joakim Kennedy, Threat Intel Manager for Anomali Research. Organizations need to establish a dedicated team to manage threat intel, and an adequate budget. Kennedy also encourages intelligence sharing as part of a stepped-up protection strategy.
Make DNS a Cornerstone of Your Cyber Security Arsenal
Dark Reading Videos | 8/22/2019 | Better known for their essential role in networking, Domain Name Servers should be tapped as a means to identify – and shut down – suspicious or destructive activity, according to Anthony James, VP of Marketing for Infoblox. He also explains how to combine DNS with DHCP and IP address management to improve an organization's security.
Endgame Boosts Apple Security to Be Commensurate with Windows Security
Dark Reading Videos | 8/22/2019 | Gone are the days when users could take refuge from Windows threats with Apple devices, as malware writers are exploiting OSX and iOS with real vigor, says Mark Dufresne, VP of R&D at Endgame. And though it's taken a while, Mac security has achieved parity with Windows so that Apple users need no longer settle for "protected enough."
Secureworks Pushes Human Intelligence, Machine Learning to Work Together
Dark Reading Videos | 8/22/2019 | Eschewing the either-or approach with machine learning, security operations centers must learn to identify and exploit the best of both approaches according to Secureworks' Tim Vidas and Nash Borges. Taken together, human and machine intelligence can be a force multiplier against human cyber adversaries, they say.
Asset Management Becomes the New Security Model
Dark Reading Videos | 8/22/2019 | While security pros once rallied around end-device management as their organizing principle, that approach is being subsumed by asset management, according to Dean Sysman, CEO and Co-Founder of Axonius. Device management becomes a subset of asset management, as organizations create a hierarchy to protect what's most valuable to them, he adds.
eSentire Blends Managed Detection and Response With Machine Learning
Dark Reading Videos | 8/21/2019 | While many infosec pros believe they're getting managed detection response (MDR) from their managed security service providers, that's not necessarily the case, according to Eldon Sprickerhoff, Founder and Chief Innovation Officer of eSentire. Adding machine learning to the mix helps automate MDR, strengthening an organization's security posture.
Ransomware Hits Fortnite Players
Ransomware masquerading as game "cheats" is hitting Fortnite players. Fortunately, there are ways to recover without paying a ransom.
Bad Actors Find Leverage With Automated Active Attacks
Dark Reading Videos | 8/21/2019 | Once used only by nation-state attackers, automated active attacks have gone mainstream and allow the average cyber-criminal to gain entry and engage in malfeasance, says Chet Wisniewski, Principal Research scientist with Sophos. Luckily, organizations are getting smarter at spotting these stealthy, customized attacks earlier than they used to.
Behind the Scenes at ICS Village
ICS Village co-founder Bryson Bort reveals plans for research-dedicated events that team independent researchers, critical infrastructure owners, and government specialists.
|