Remove category taxonomies
article thumbnail

Do You Trust Your SIEM?

Anton on Security

trust the event taxonomies if their lives and breach detections depend on it.” Related blog posts: “Security Correlation Then and Now: A Sad Truth About SIEM” “Today, You Really Want a SaaS SIEM!” Specifically, as a bit of a throwaway comment, I said “people write stupid string-matching and regex-based content because they trust it.

Passwords 257
article thumbnail

Mapping CVEs and ATT&CK Framework TTPs: An Empirical Approach

NopSec

This blog post focuses on how to create a bridge / correlation between CVE, CAPEC, CWE and ATT&CK vulnerability and attack taxonomies for the purpose of better understanding attack vectors and methods. There is one CVE Record for each vulnerability in the catalog. In this case, the CVE represents a severity score of 7.2

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Do You Trust Your SIEM?

Security Boulevard

trust the event taxonomies if their lives and breach detections depend on it.”. If there is a taxonomy (wow, much 2002 SIEM!), you trust the SIEM to map the events to the correct category and not to confuse “password guessing” with “logon failure” or whatever. They do not?—?en en masse?—?trust Do You Trust Your SIEM?

article thumbnail

Italian National Cybersecurity Perimeter: With great power comes great responsibility!

Privacy and Cybersecurity Law

Receive our latest blog posts by email. Each type of incident is then assigned an identification code followed by a brief description. Companies are increasingly expected to actively provide, with a “security by design” approach, effective protection for their networks, IT systems and, ultimately, to all individuals and their data. [1]

article thumbnail

Securing Containers with NIST 800-190 and MVISION CNAPP

McAfee

Additionally, by mapping these threats and incidents to the MITRE ATT&CK tactics and techniques, it provides a common taxonomy to cloud security teams regardless of the underlying cloud application or an individual component. The post Securing Containers with NIST 800-190 and MVISION CNAPP appeared first on McAfee Blogs.

article thumbnail

On Detection: Tactical to Functional

Security Boulevard

Welcome to my new blog series, “On Detection: Tactical to Functional,” where I intend to explore and expand my understanding of that which we attempt to detect. My recent observation is that a three-tiered taxonomy (such as TTP) is far too limiting to facilitate the necessary conversation to improve our thinking about detection.

article thumbnail

Advanced threat predictions for 2023

SecureList

Last June, Google’s TAG team released a blog post documenting attacks on Italian and Kazakh users that they attribute to RCS Lab, an Italian offensive software vendor. In line with our predictions, we released two blog posts in 2022 introducing sophisticated low-level bootkits.

Firmware 106