Protecting the Crown Jewels
Summary of the features in StealthWatch 6.5 that protect sensitive data from theft by insider threat or advanced attack.
Summary of the features in StealthWatch 6.5 that protect sensitive data from theft by insider threat or advanced attack.
Some organizations have chosen to adopt a "plausible deniability" strategy to InfoSec. This article outlines some methods of helping these organizations move to a safer security practice.
The final installment of the NBAD series covering relationship anomaly detection.
Part 4 of the NBAD series on host anomaly detection.
Hospitals are under attack from cyber criminals and state sponsored attackers. This article reviews the cause and some remedies to the poor state of InfoSec in healthcare.
Third part of the network behavioral anomaly detection (NBAD) series on the role of behavioral detection.
In the second part of the NBAD series, signature detection methodologies are examined.
The first part in this series covers the history of Network Behavioral Anomaly Detection (NBAD.)
Vendors like to create an ocean of alarms in their products so they can dogpile after an event and claim that "they caught it." This article goes through the dangers of false positives in incident response and how to address them.
The most dangerous and difficult risk to detect to an organization is insider threat. When a trusted asset decides to betray the trust of his benefactor for the sake of ideology, greed or extortion the organization can suffer long lasting damage. This article outlines the nature and strategies of handling insider threat.