Cisco Secure Network Analytics provides pervasive network visibility and security analytics for advanced protection across the extended network and cloud. The purpose of this blog is to review two methods of using threat intelligence in Secure Network Analytics. First, we will cover the threat intelligence feed, and then we will look at using your own internal threat … [Read more...] about Leveraging Threat Intelligence in Cisco Secure Network Analytics
Intelligence
The Emerging Role of AI in Open-Source Intelligence
Jul 03, 2024The Hacker NewsOSINT / Artificial Intelligence Recently the Office of the Director of National Intelligence (ODNI) unveiled a new strategy for open-source intelligence (OSINT) and referred to OSINT as the "INT of first resort". Public and private sector organizations are realizing the value that the discipline can provide but are also finding that the exponential … [Read more...] about The Emerging Role of AI in Open-Source Intelligence
Business observability: Bridging IT intelligence and business KPIs with AI
In the dynamic world of modern business, this parable is more relevant than ever. Consider your enterprise as the elephant, and the various functional teams — IT, software engineering, security, and business units — as the blindfolded individuals. Each department is focused on its specific role and develops a limited understanding of the organization's complex environment. IT … [Read more...] about Business observability: Bridging IT intelligence and business KPIs with AI
CrowdStrike’s View on the New U.S. Policy for Artificial Intelligence (AI)
The major news in technology policy circles is this month’s release of the long-anticipated Executive Order (E.O.) on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. While E.O.s govern policy areas within the direct control of the U.S. government’s Executive Branch, they are important broadly because they inform industry best practices and can … [Read more...] about CrowdStrike’s View on the New U.S. Policy for Artificial Intelligence (AI)
The Interdependence between Automated Threat Intelligence Collection and Humans
The volume of cybersecurity vulnerabilities is rising, with close to 30% more vulnerabilities found in 2022 vs. 2018. Costs are also rising, with a data breach in 2023 costing $4.45M on average vs. $3.62M in 2017. In Q2 2023, a total of 1386 victims were claimed by ransomware attacks compared with just 831 in Q1 2023. The MOVEit attack has claimed over 600 victims so far and … [Read more...] about The Interdependence between Automated Threat Intelligence Collection and Humans
Falcon Intelligence Recon+ and the Dark Web
The vastness of the deep and dark web can easily turn attempts to monitor for cyber threats into a firehose of useless information. Part of the problem is the nature of the data streams that need to be monitored. Every day, more credentials are stolen and exposed. Illegal criminal forums are full of repeated spamming of illicit advertisements. Thousands of new domain names are … [Read more...] about Falcon Intelligence Recon+ and the Dark Web
Using Artificial Intelligence and Machine Learning to Combat Hands-on-Keyboard Cybersecurity Attacks
Malware gets the headlines, but the bigger threat is hands-on-keyboard adversary activity which can evade traditional security solutions and present detection challenges Machine learning (ML) can predict and proactively protect against emerging threats by using behavioral event data. CrowdStrike’s artificial intelligence (AI)-powered indicators of attack (IOAs) use ML to detect … [Read more...] about Using Artificial Intelligence and Machine Learning to Combat Hands-on-Keyboard Cybersecurity Attacks
Our Responsible Approach to Governing Artificial Intelligence
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Chief Information Officers and other technology decision makers continuously seek new and better ways to evaluate and manage their investments in innovation – especially the technologies that may … [Read more...] about Our Responsible Approach to Governing Artificial Intelligence
How CrowdStrike Intelligence Uses Fuzzing to Hunt for Bugs
One useful method in a security researcher’s toolbox for discovering new bugs in software is called “fuzz testing,” or just “fuzzing.” Fuzzing is an automatic software testing approach where the software that is to be tested (the target) is automatically fed with input data and its behavior during execution is analyzed and checked for any errors. For the CrowdStrike … [Read more...] about How CrowdStrike Intelligence Uses Fuzzing to Hunt for Bugs
Threat Intelligence in SecureX: Fast, Free, or Easy (pick any three)
SecureX is Cisco’s free, acronym-defying security platform. (“Is it XDR? Is it SOAR? Does it solve the same problems as a SIEM? As a TIP?” “Yes.”) From the very beginning, one of the pillars of SecureX was the ability to consume and operationalize your local security context alongside global threat intelligence. And to that end, SecureX includes, by default, a few very … [Read more...] about Threat Intelligence in SecureX: Fast, Free, or Easy (pick any three)