EDR
DTEX EDR Integrations: The Next Partner Opportunity
In the past few years, we have seen a massive correlation between data loss incidents and remote working. In fact, the DTEX i3 2022 Insider Risk Investigations Report found 75% of insider ...
How to Know if You’ve Been Infected by Ransomware
Detecting ransomware activity has become increasingly difficult because adversaries are constantly evolving their tools, tactics and techniques. For example, threat actors are using new programming languages like Rust to help avoid detection ...
Achieving Operational Excellence in a Cybersecurity Program
As cybersecurity threats continue to grow in complexity and frequency, achieving operational excellence in threat detection and response is more important than ever. However, SOCs (Security Operation Centers) often face a variety ...
Enabling File Integrity Monitoring on Windows with Osquery and EclecticIQ Endpoint Response
File Integrity Monitoring (FIM) is a security control that helps organizations ensure the integrity of their files and systems by monitoring changes to files and directories. FIM is an important security control ...
If Infosec Was a Supermarket Business
By Jordan Durham I was recently reading an article which made a brief analogy between cybersecurity and a retail store. This got me thinking – could there be a deeper analogy made ...
Weak Creds, Unpatched Flaws, Reliance on Tools Plagued Orgs in 2022
Organizations often either have weak credential policies or don’t enforce them, making it easy for attackers to use legitimate credentials to log in—or live off the land—rather than using topflight tools to ...
Do You Need EDR if You Already Have a Firewall?
Considering the effectiveness of an endpoint security solution when a firewall is already in place is a valid concern for any organization looking to run lean. On the surface, they can look ...
Why MSSPs Must Go Beyond Pure Efficiency to Deliver Value in Cybersecurity
Today’s managed security service providers (MSSPs) are faced an eternal struggle when it comes to their customers. They must be able to provide a sufficient level of value while at the same ...
Compliance Does Not Equal Cybersecurity
HIPAA, GDPR, PCI, CIS, NIST. Does any of those acronyms sound familiar? Chances are, you’ve heard of several and have a general understanding of what they’re all about. For those that don't, ...
Data Philosophy and Technology Combine for Better Endpoint Security
Russel Ackoff was the one of first to define a hierarchy from data to wisdom (1). In Ackoff’s words: "Data are symbols that represent the properties of objects and events. Information ...