Threat intelligence is an elusive concept. Cyber-security vendors have developed numerous definitions for it based upon different procedural viewpoints. As a result, the key concept and principle of threat intelligence is explaining the role it plays within cyber-security and network defence, while offering advice and best practice. This will equip the reader with a basic understanding of the benefits of threat intelligence and the importance of investing effort and resources into responding to it.
When attackers have breached your network, one of the first actions they will take is to passively fingerprint the network to see what might be good to exfiltrate or encrypt. When we detect any activity with the Canary or it’s associated files, we will be alerted therefore enabling further investigation by our analysts and, if we find it to be a true positive, we will let you know.
Volume licensing is essentially a consumption-based pricing model: you pay for what you use. Traditional, on-premises SIEM (Security Information & Event Management) solutions usually operate on this basis, which has a number of key drawbacks for businesses:
Protecting an organisation from cyber crime is a relentless task, as both security solutions and means to attack continue to evolve. The repercussions of a security ‘incident’ can be costly, in terms of financial loss, data recovery and damage to reputation.
Every year Gartner publishes its Magic Quadrants covering numerous markets within the technology sector. In February, Gartner released the Magic Quadrant for Managed Security Services, Worldwide; an area that we, … Continue reading Where’s the magic in Gartner’s quadrant?
Here’s how most articles about GDPR start … Have you heard of GDPR? Do you know that it’s coming into force soon? Did you know that if your business falls … Continue reading GDPR: Beware of business ambulance chasers
Many of our customers have been asking about Artificial Intelligence (AI) and Machine Learning: asking whether AI tools exist that can protect their businesses more effectively than conventional cyber security … Continue reading AI and cyber security – does it exist?
One significant frustration for CIOs, CISOs and senior IT professionals charged with data and system security is that, while there are many solutions on the market that provide tools for … Continue reading Next gen cyber security that’s revolutionary priced
Cyber attacks in the retail and FMCG sector are not confined to ecommerce businesses such as with online payment fraud or distributor denial of service (DDoS) attacks. While these are … Continue reading Think retail is safe from cyber attacks? Think again…
2017 has been a tough year in cyber security. We’ve seen businesses, big and small, get hit by data breaches and cybercrime resulting in a steady stream of headlines; WannaCry, … Continue reading Things to consider when choosing a cyber security vendor
We know, it’s not your fault. You joined a financial services firm and inherited processes, software and systems that were installed by your predecessor, if not before. Given the choice … Continue reading The problem with your inherited legacy systems
Building your business’ reputation and brand image takes time – years even – and costs money. Investment in marketing, customer services and PR activities does not come cheap, yet it … Continue reading Protect your brand and reputation with these 5 ways to minimise data breaches
https://blog.checkpoint.com/2017/09/11/beware-bashware-new-method-malware-bypass-security-solutions/ It is picking up a lot of chatter amongst the security and IT community, and we suspect will soon be as widely spoken about as HeartBleed. Criminals are exploiting … Continue reading You’ll probably shortly be reading about a new piece of nastiness in security called Bashware:
For the recruitment industry, candidate data is what differentiates a successful recruitment agency or recruiter from those that fail to hit target. Recruitment agencies spend many years building up and … Continue reading Recruitment agencies and their candidates are a key target for today’s cyber-criminals
Why is cyber security management so often reactive? Typically, it’s because security is bolted on to existing network systems and architecture when vulnerabilities are identified or a threat hits home. … Continue reading Getting back to basics – building a secure network architecture
Most business owners, CEOs and CIOs are concerned about an unseen army of cyber criminals and hackers poised to attack their business, hold their IT systems and data to ransom … Continue reading The biggest IT security threats are often inside your own company