Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hypothesis-Driven Hunting with the PEAK Framework

Picture yourself as a cyber detective, ready to uncover the hidden threats lurking in the shadows of your organization's network. Sounds exciting, right? Well, hypothesis-driven hunting is all about channeling your inner Hercule Poirot to stay one step ahead of adversaries working against you. The PEAK threat hunting framework identifies three primary types of hunts: In this post, we’re going to look at hypothesis-driven hunting in detail.

CrowdStrike Expands Falcon Data Replicator Capabilities to Boost SOC Performance

Are you getting the most from your data? Collecting data from across your environment can provide security teams with the visibility needed to detect and respond to threats, but large volumes of data and alerts can be overwhelming and cause excessive noise. And, not all data is useful data — some details or feeds may be irrelevant for your teams, causing unnecessary complexity and bogging down infrastructure.

What are honey pots? Hacker explains why honey pots are so effective at catching security breaches

Hacker Adriel Desautel explains why honey pots are such an effective tool to use against malicious threat actors. Adriel is a legendary personality in the security and hacking communities, today as the founder and CEO of Netraguard he, along with his team, conduct real world penetration tests on organizations of all sizes. This clip is part of an episode in The Security Repo Podcast where white hat hackers Noah Tongate and Adriel Desautel give real world advice on how to protect yourself against 'people like them'.

Wiz's Yinon Costica: Using a self-serve model to better equip organizations and improve security posture

In this season’s finale of the Future of Security Operations podcast, Thomas chats with Yinon Costica, Vice President of Product and co-founder at Wiz, the leading cloud infrastructure security platform that enables organizations to identify and remove the most pressing risks in the cloud. Yinon has more than 15 years of experience leading cybersecurity product development teams, with expertise in the cloud security market.

What is a Kerberoasting Attack and How to Prevent It

A lot of us are fascinated with technology. Any form or mention of the subject piques an interest or at least a glance of curiosity. Unfortunately, we must endure the dark side of technology as well. From the beginning of the computer age, there have always been hackers who could match their criminal expertise to current technologies. Some hackers are concerned with small scams and easy entry points.

The 443 Episode 241 - Securing Healthcare Tech

This week on the podcast, we cover two new malware research pieces, including the latest evolution of a delivery vehicle as old as time. After that, we cover recent regulations in the healthcare industry that have a chance to push the industry to a more secure future. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.