article thumbnail

NDR unveiled as essential when complying with the Executive Order

Cisco Security

Endpoint detection and response (EDR), multi-factor authentication (MFA), and the need for increased encryption, while implementing a zero-trust approach, were all called out as requirements within the order. While the term NDR is relatively new, the technology is not. Detection of stealthy and unknown threats.

article thumbnail

Anton’s Security Blog Quarterly Q4 2021

Security Boulevard

“Can We Have “Detection as Code”?”. Why Is Threat Detection Hard?”. “A A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next”. Episode 17 “Modern Threat Detection at Google”. Episode 27 “The Mysteries of Detection Engineering: Revealed!”. Do They Matter?”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anton’s Security Blog Quarterly Q4 2021

Anton on Security

Skills, Not Tiers” “Beware: Clown-grade SOCs Still Abound”” “Revisiting the Visibility Triad for 2020” Top 5 posts with the most Medium fans : “Security Correlation Then and Now: A Sad Truth About SIEM” “Beware: Clown-grade SOCs Still Abound” “Can We Have “Detection as Code”?” “Why Why Is Threat Detection Hard?” “A

article thumbnail

Establishing Security Maturity Through CIS Cyber Defense Framework

McAfee

This blog is a continuation of the CIS whitepaper published here where we introduce CIS Controls and McAfee product capabilities. Automation – Security automation is key in achieving scalability around threat detection, protection and response. CIS and System Hardening.

article thumbnail

If Infosec Was a Supermarket Business

Security Boulevard

So, let’s consider a supermarket as if it were a well-known and respected enterprise with information technology (IT) capabilities and a cybersecurity program, what does the supermarket look like then? Check out the whitepaper on “ 5 Questions to Ask About Your EDR ” to help you make an informed decision. Download it on Github.

InfoSec 52
article thumbnail

The Evolving Role of the SOC Analyst

Security Boulevard

His journey gives him insight into how exactly threat detection and response have evolved over the last twenty years or so. Now they’re all crucial elements of any technology-driven company (hint: all companies are). To build an effective SOC team that can deal with threats appropriately, ask: How do we find the right talent?

article thumbnail

Using AI/ML to Create Better Security Detections

Security Boulevard

But advances in computer technology have allowed us to develop a better way. Whitepaper: Power to the People - Democratizing Automation & AI-Driven Security. Whitepaper: AI, By and For the People Fusing Machine Precision & Human Intuition. Mapping indicators to an industry standard (e.g., Application and next steps.