Cyber attacks on corporate networks were up 50% in 2021, and it’s expected that 2022 will see more of the same. Elastic Endpoint Security includes a variety of protection layers to ensure maximum coverage against different types of malware. There have been a few examples recently of the need for fast, accurate updates of user environments in order to protect against the latest … [Read more...] about Automating the Security Protections rapid response to malware
Response
Forrester names Elastic a Strong Performer in the Endpoint Detection and Response Wave
Security at scaleForrester stated in the EDR Wave that “Threat hunters can search data and visualize it with graphs and charts, and can also schedule queries.” The analyst firm also mentioned that “Elastic is best suited for security teams with a depth of knowledge that want a flexible offering with features of SIEM and EDR.” Elastic purposefully combined SIEM and EDR so that … [Read more...] about Forrester names Elastic a Strong Performer in the Endpoint Detection and Response Wave
Introducing Logz.io Event Management: Accelerating Collaborative Threat Response
In the domain of cyber threat response, there’s a critical resource that every organization is desperately seeking to maximize: time.It’s not like today’s DevOps teams aren’t already ruthlessly focused on optimizing their work to unlock the greater potential of their human talent. Ensuring your organization to identify and address production issues faster – and increase focus … [Read more...] about Introducing Logz.io Event Management: Accelerating Collaborative Threat Response
The Right Way to Extend Detection and Response
This week we announced the general availability of CrowdStrike’s newest innovation, Falcon XDR, and I couldn’t be more excited. Using our same single, lightweight agent architecture, Falcon XDR enables security teams to bring in third-party data sources for a fully unified solution to rapidly and efficiently hunt and eliminate threats across multiple security domains. As George … [Read more...] about The Right Way to Extend Detection and Response
Logz.io Security Update: Log4j / Log4Shell Vulnerability Response
On December 9, a severe remote code vulnerability was revealed in Apache’s Log4J library, a Java-based logging tool widely used in applications around the world. This vulnerability allows an attacker who can control log messages to execute arbitrary code loaded from attacker-controlled servers – impacting a broad range of services and applications.Logz.io has been aware of the … [Read more...] about Logz.io Security Update: Log4j / Log4Shell Vulnerability Response
CrowdStrike Services Releases Free Incident Response Tracker
The CrowdStrike Incident Response Tracker is a convenient spreadsheet that includes sections to document indicators of compromise, affected accounts, compromised systems and a timeline of significant events CrowdStrike incident response teams have leveraged this type of tracker in thousands of investigations Download the CrowdStrike Incident Response Tracker Template During a … [Read more...] about CrowdStrike Services Releases Free Incident Response Tracker
Accelerate Troubleshooting, Forensics and Response With Fast and Efficient Search
This blog was originally published Nov. 22, 2021 on humio.com. Humio is a CrowdStrike Company. Whether you’re diagnosing a system outage, mitigating a malicious attack or trying to get to the bottom of an application-response-time issue, speed is critical. Pinpointing and resolving issues quickly and easily can mean the difference between success and crisis for any business, … [Read more...] about Accelerate Troubleshooting, Forensics and Response With Fast and Efficient Search
Download the Essential Guide to Response Automation
In the classic children's movie 'The Princess Bride,' one of the characters utters the phrase, "You keep using that word. I do not think it means what you think it means." It's freely used as a response to someone's misuse or misunderstanding of a word or phrase. "Response Automation" is another one of those phrases that have different meanings to different people. It's … [Read more...] about Download the Essential Guide to Response Automation
SecureX threat response Turnkey Integrations
SecureX turns one year old next month. It has been quite a journey from the first announcement at RSA Conference 2020, when there was one 3rd party integration (VirusTotal), to the release of SecureX the summer of 2020 with a large ecosystem. When SecureX was launched, we had several turnkey partner integrations into SecureX, like the Splunk add-on and QRadar extension. … [Read more...] about SecureX threat response Turnkey Integrations
Cyber Hygiene: An ounce of prevention is worth a pound of incident response
Today’s incident response teams operate like hospital emergency rooms (ERs). When an alert comes in—malware infection, intrusion, anomalous behavior, etc.—a specialist is called in for diagnosis and remediation. In cybersecurity, as in healthcare, good preventive care can improve outcomes and reduce costs. At Cisco, I’ve been a part of a team responsible for imagining a … [Read more...] about Cyber Hygiene: An ounce of prevention is worth a pound of incident response