article thumbnail

MY TAKE: Sophos X-Ops advances internal, external threat intelligence sharing to the next level

The Last Watchdog

Related: How ‘Internet Access Brokers’ fuel ransomware I happened to be in the audience at Stanford University when President Obama took to the stage to issue an executive order challenging the corporate sector and federal government to start collaborating as true allies.

article thumbnail

Petya Ransomware: What You Need to Know and Do

Andrew Hay

Unless you’ve been away from the Internet earlier this week, you’ve no doubt heard by now about the global ransomware outbreak that started in Ukraine and subsequently spread West across Western Europe, North America, and Australia yesterday. Petya’ Ransomware Outbreak Goes Global – Krebs On Security. Further reading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: ‘SaaS security posture management’ — SSPM — has emerged as a networking must-have

The Last Watchdog

First of all, there was a lack of any knowledge base inside companies and often times the owner of the given SaaS app wasn’t very cooperative.”. Fraudulent cash transfers, massive ransomware payouts, infrastructure and supply chain disruptions all climbed to new heights. SaaS due diligence.

Security 201
article thumbnail

MY TAKE: Equipping SOCs for the long haul – automation, edge security solidify network defenses

The Last Watchdog

Primary vectors take the form of phishing campaigns, supply chain corruption and ransomware attacks, like the one that recently resulted in the shut down of Colonial Pipeline. Here are the takeaways: Pressurized landscape. Organizations today must withstand a constant barrage of cyber attacks. But it’s just a start.

Security 114
article thumbnail

What are Breach and Attack Simulations?

IBM Big Data Hub

Improved detection and response : Built on APT knowledge bases like MITRE ATT&CK and the Cyber Killchain, and also integrating well with other security technologies (e.g., Additionally, data-driven prioritization helps SOC teams address their most critical vulnerabilities first.

article thumbnail

How Hackers Use Reconnaissance – and How to Protect Against It

eSecurity Planet

MITRE ATT&CK , a popular knowledge base for beginners and security professionals, defines reconnaissance as a fundamental tactic that leverages the “techniques that involve adversaries actively or passively gathering information that can be used to support targeting.”.

IT 130
article thumbnail

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

The Last Watchdog

Ransomware, business email compromises and direct ACH system hacks continue to morph and intensify. With ransomware, and other types of attacks common today, they are big enough to attack. Instead, getting trained and certified gives them a knowledge base to and contract out that expertise when their company needs it.

IT 103