Cyber Kill Chain Steps and How to Defend Against APTs
The Cyber Kill Chain® methodology was developed by the military defense firm, Lockheed Martin, to address cyberattacks by identifying the pattern and behavior of cybercriminals as they carry out an attack. These actions are referred to as cyber kill phases.[1]…
Read More
September 13, 2021
Automation Use Cases Using LogRhythm.Tools
Posted by: Dan Crossley
LogRhythm.Tools is a PowerShell framework which acts as a wrapper for the LogRhythm API. This simplifies interactions with the LogRhythm API because you only need to run a PowerShell cmdlet to call an API function, rather than a direct interaction with your own…
Read More
September 9, 2021
Executive Order on Zero Trust — What it Means for Federal Agencies
Posted by: Scott Monfredo
While Ronald Reagan was president during the height of the Cold War in the 1980s, he popularized an old Russian phrase that was translated as “trust, but verify.” Reagan invoked this phrase to emphasize the extensive verification procedures that would…
Read More
September 3, 2021
Keeping Up with U.S. Cybersecurity Regulatory Compliance Requirements
Posted by: Kyle Dimitt
2021 has provided no shortage of security events and incidents. The increasing frequency and severity of supply chain and ransomware attacks have put pressure on governments and various regulators to act, which has created a lot of noise and uncertainty…
Read More
August 26, 2021
Combating Ransomware and APTs with MistNet NDR
Posted by: Dan Dearing
“Greetings! Your company network has been hacked. All of your important files have been encrypted!” Last year NPR revealed that over 65,000 companies received a ransomware note like this, averaging seven attacks per hour. Unfortunately, things appear to be getting…
Read More
August 5, 2021
Detecting Attacks on Amazon Web Services (AWS)
Posted by: Ashok Chokalingam
Amazon Web Services (AWS) is well known for its shared responsibility model: AWS is responsible for fixing the flaws in the infrastructure and its customers are responsible for configuring and adequately protecting their own data using access management or other…
Read More
August 4, 2021