NetMon & Behavior Analysis
Achieve Real-Time Network Visibility When attackers compromise the perimeter or are operating from within, you need to know. You can only stop attackers from gaining a foothold in your network to expand their presence if you can see them. The…
Read More
September 23, 2016
Triage: The Art of Threat Detection and Risk Assessment
In healthcare, medical professionals use triage procedures to quickly assess, prioritize and allocate the right resources to treat patients, adjusting their response to the severity of the situation. Similar to healthcare, today’s cybersecurity teams are dealing with a constant barrage…
Read More
September 19, 2016
Activated Charcoal
Making Sense of Endpoint Data Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends,…
Read More
September 6, 2016
Mitigating Risk of Cybersecurity Exploits to Medical Devices in Hospital Networks
As the need for a cost-effective patient care increases, developments and innovation in healthcare technology accelerates. Nowadays, the numerous advances in sophisticated network enabled medical devices allow increased cooperation and communication between patients, healthcare centers, and manufacturers. This direct connection…
Read More
August 30, 2016
Beyond the Sticker Price
Factors Impacting the Total Cost of Ownership of a SIEM Many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that…
Read More
August 18, 2016
Top 8 Things to Analyze in Outbound Packets
Most modern malware operates as part of a system. Whether it’s a multi-part kill chain with droppers and payloads, a botnet with command and control servers, or ransomware encrypting files, the malware on the compromised system talks to other systems…
Read More
August 16, 2016