Remove i.e.
article thumbnail

Role of Context in Threat Detection

Anton on Security

The debate focused on the role of context in threat detection. Specifically, it is about the role of local context (environment knowledge, organization context, site details, etc) in threat detection. Can threat detection work well without such local context? Now, some of you will say “yes, of course!”

article thumbnail

Deloitte acquires industrial Cybersecurity solution provider aeCyberSolutions

CyberSecurity Insiders

The financial terms of the deal are yet to be known, but reports are in that the deal only includes assets belonging to the cyber arm of the Applied Engineering Solutions (aeSolutions) and not other businesses. Root9B a threat detection service provider that will be integrated into Deloitte’s Fusion Managed Security Service.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Focus Threat Intel Capabilities at Detection Engineering (Part 4)

Anton on Security

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. Incomplete, too high-level or overly specific data leads to long analysis time, bias and ultimately inconsistent detection quality and detection coverage gaps.

article thumbnail

Having Confidence in Your Wireless Security

Cisco Security

Cisco’s Advanced Wireless Intrusion Prevention System (aWIPS) and Rogue Management is a fully infrastructure-integrated solution that constantly monitors radio spectrum to detect, analyze, and thwart attacks. At this point, aWIPS identifies the de-authentication attack and creates an alert so IT and the network can take action.

Wireless 118
article thumbnail

Increasing Your Business’s Cyber Threat Intelligence

SiteLock

Use comprehensive threat detection and monitoring. Most companies don’t even realize they’ve been compromised by an advanced persistent threat (APT) for nearly two months after a breach. Implementing a system of threat indicators and blocking mechanisms. As the saying goes: “It’s not just about your IQ.

article thumbnail

Reassessing cyberwarfare. Lessons learned in 2022

SecureList

That said, a number of those tools are very crude from a software engineering perspective and appear to have been developed hurriedly. With the notable exception of AcidRain (see below), we believe that these various destructive attacks were both random and uncoordinated – and, we argue, of limited impact in the grand scheme of the war.

DDOS 131
article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

Finally, the tool may “scale physically, but not economically” i.e. it will run at scale you need, but nobody can realistically afford it … Tool deployed and then not operationalized sounds like a process failure, or a people failure. I lamented on this back in 2012 , and this affliction has not truly subsided.