I love it when data surprises me. In cybersecurity, we’re good at researching how things can go wrong, but it’s harder to figure out when things are going right. Most of our prescriptive advice starts to sound obvious after all these years: least privilege. Patch all the things. Segmentation. Redundancy. Resilience. And always, always, encryption. But which practices actually … [Read more...] about Does Protection Help As Much As We Think In Security?
Protection
Offline Protection for Remote Systems
Introduction Remote working has many employees not only working from home but really from anywhere. Services necessary to work remotely such as VPN, cloud-based applications and internet access vary along with the reliability of those services. Inconsistent service availability means employees work both online and offline. As attacks against remote systems continue to surface, … [Read more...] about Offline Protection for Remote Systems
MITRE ATT&CK: The Magic of Endpoint Protection
In our first blog, we introduced the Magic of Mitigations. They’re the key to getting started with MITRE ATT&CK. Now let’s look at some of the most magical ones, starting today with Behavior Prevention on Endpoint (M1040), Exploit Protection (M1050) and Execution Prevention (M1038). Wait, what’s the difference? At a quick glance, they might all sound about the same. So … [Read more...] about MITRE ATT&CK: The Magic of Endpoint Protection
Cynet Takes Cyber Threat Protection Automation to the Next Level with Incident Engine
We have all heard of the "cybersecurity skills gap" — firms' inability to hire and retain high-level cybersecurity talent.I see this gap manifesting in two ways. First, companies that want to hire cybersecurity talent simply cannot find candidates with sufficient skills. Second, companies that cannot afford specialized cybersecurity talent and therefore lack the necessary … [Read more...] about Cynet Takes Cyber Threat Protection Automation to the Next Level with Incident Engine
Threat protection: The WastedLocker ransomware
Co-authored by Martin Lee, Talos Outreach manager, EMEA. Threat Protection is a new blog series as part of a collaboration between Talos and Cisco Security, combining Talos’ knowledge of the threat landscape and the Cisco Security portfolio. In it, we will highlight particular threats and showcase how Cisco Security’s multi-layered approach can prevent them from affecting your … [Read more...] about Threat protection: The WastedLocker ransomware
(Live) Webinar – XDR and Beyond with Autonomous Breach Protection
Anyone paying attention to the cybersecurity technology market has heard the term XDR - Extended Detection and Response.XDR is a new technology approach that combines multiple protection technologies into a single platform. All the analyst firms are writing about it, and many of the top cybersecurity companies are actively moving into this space.Why is XDR receiving all the … [Read more...] about (Live) Webinar – XDR and Beyond with Autonomous Breach Protection
Umbrella with SecureX built-in: Coordinated Protection
This blog was written by David Gormley, Cloud Security Product Marketing Manager at Cisco. Cybercriminals have been refining their strategies and tactics for over twenty years and attacks have been getting more sophisticated. A successful cyberattack often involves a multi-step, coordinated effort. Research on successful breaches shows that hackers are very thorough with … [Read more...] about Umbrella with SecureX built-in: Coordinated Protection
Free protection and decryptors for ransomware
Ransomware never seems to go out of style, and lately we’ve seen a lot of requests to help people in their fight against it. That’s why we’ve assembled this post with everything you need to know about how to protect yourself from ransomware, how to mitigate any damage it’s already done, and the options you have to do so. What is ransomware? But first, let’s talk about basics. … [Read more...] about Free protection and decryptors for ransomware
Relentless Breach Defense Endpoint Protection Platform + Endpoint Detection and Response
As evasive and complex as today’s threats have become, it’s no wonder security professionals in organizations of all sizes are ripping out their legacy antivirus completely in favor of Endpoint Protection Platforms (EPP) and Endpoint Detection and Response (EDR) technologies. Endpoint Protection Platform (EPP) delivers next generation antivirus that stops today’s complex … [Read more...] about Relentless Breach Defense Endpoint Protection Platform + Endpoint Detection and Response
How to Get Better Protection with Falcon Prevent
Introduction This document and video will demonstrate how CrowdStrike’s Falcon Prevent offers superior next generation AV protection against all types of attacks through a single, lightweight agent and cloud delivered console. Video Simplified Management from the Cloud On the main Falcon dashboard, you see an overview of the events in our environment. On the right … [Read more...] about How to Get Better Protection with Falcon Prevent