Using Network Metadata to Transform Threat Detection and Investigation
When your agency detects a network attack, you need to act fast to understand what’s going on. But getting the insights and analytics you need takes time and often doesn’t trace threats back to the source.
Supercharge Your SIEM with Threat Hunting
Security Information Event Management (SIEM) tools have been around for quite some time. SIEMs are great for aggregating log files, parsing them, and using real-time correlation rules to spot security incidents. But more advanced incidents can evade detection by your SIEM. Finding those evasive threats becomes a lot easier if you employ threat hunting.
The Problem of Employee Security Fatigue and How to Overcome It
Does your organization suffer from security fatigue? They probably do. That’s according to a new study from NIST.
Common symptoms of security fatigue include updating your password with a slight variation on the last one and a “weariness or reluctance to deal with computer security.” All of which can cause computer users to feel and act recklessly.
How the DoD Can Address its Cybersecurity Mandates
Security has become one of the biggest IT challenges in the last 20 years. Regulations, threats, and the many different ways in which adversaries can gain access to sensitive network infrastructures, particularly within the Department of Defense (DoD), have spurred cyber priorities and strategic goals. These include defending the DoD information network, securing DoD data, and mitigating risks to DoD missions (Strategic Goal II) while being prepared to defend the U.S.
How Malware and Spam Groups Exploited the U.S. Election
Cybersecurity, or lack thereof, was a hallmark of the 2016 election season. With Clinton’s campaign chairman, John Podesta, being chief among the targets of cyber attackers. In March of this year, Podesta fell victim to the oldest trick in the book – phishing – which led to the subsequent hacking and Wikileaks-led disclosure of hundreds of thousands of emails.
Government File Sharing: 5 Steps to Reduce Data Leakage Risks
Data dissemination and file sharing between agencies and law enforcement authorities is a natural part of government business. But what happens when those files leave the security of domain-controlled network drives and content management systems?
10 Ways to Secure Big Data at Rest and In-Transit
Cloud computing has made collecting, storing, and processing data easier and cheaper than ever. Agencies are increasingly leveraging big data to drive actionable insights and improve cyber threat detection. Furthermore, more than 60% of agencies are using big data to reduce costs and operating expenses, writes Information Week.
Layered Security Strategies for the Health Sector: An ICIT Briefing
Our very own Chief Cybersecurity Technologist and Institute for Critical Infrastructure Technology (ICIT) fellow, Don Maclean, recently joined fellow fellows Robert Lord (Protenus), John Menkahart (Securonix), Dr. Ron Ross (NIST) and ICIT co-founder and senior fellow, Parham Eftekhari on Capitol Hill to discuss the risks and threats associated with cyber attacks on healthcare facilities.
4 Essential Components to Blocking Cyber Attacks
Nothing seems to surprise us anymore when it comes to cybersecurity. Attacks against government agencies and businesses are constantly in the headlines. Just last year, DLT partner, Symantec, discovered more than 430 million new unique pieces of malware across its Global Intelligence Network – that’s an increase of 35% over the previous year.
Big Data Analytics Can Thwart Cyber Threats – But Feds are Struggling
We all know that sifting through data is an overwhelming challenge for federal agencies. Various data types, stored across a range of disparate siloes, and a lack of resources to analyze the sheer amount of data, has long held up data analytics in government.