Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Jay Peak: Proactively Preventing Threats to Ensure Operational Stability

On any given day Jay Peak, a Four Seasons Ski Resort in Vermont, has more than 6,000 devices on their network. IT touches just about every facet of the guest and business experience, from network security and point of sale, to building infrastructure and management. It's the responsibility of IT to ensure the entire operation is functioning, 24/7. As a small staff how do they proactively protect their business and guests against potential threats?

Taking a Data-Driven Approach to SOC Operations

Today’s escalating threat landscape means that security operations teams face a multitude of challenges. This can make it challenging for them to keep pace with the sheer scale of threats, tactics and techniques that bad actors frequently use. When you consider recent ransomware attack statistics, it is easy to see that cybercrime has intensified, with a record-breaking number of threats of increasing severity taking place year-on-year.

A Partnership Protecting Critical Infrastructure: Centripetal and Dynics

Threat activity today is incredibly high, and industrial infrastructure is a primary target. Centripetal and Dynics are partnering to combine IT and OT expertise to better protect critical infrastructure and industrial control systems across the United States.

Streamlining threat intelligence with Pulsedive and Tines

Professionals working in cyber threat intelligence (CTI) overwhelmingly enjoy their jobs; over 66%, according to a limited survey of CTI professionals. They enjoy playing detective, investigator, researcher, analyzer, and communicator. What do they not love about the job? Chasing down bits and pieces of information manually through tons of different interfaces. Wrangling a time-intensive monstrosity of various files, web pages, and inconsistent formats, then merging them (ungracefully).

XDR best of breed, and how an open architecture will get you there

The security landscape is continually changing and the race to stay ahead is often one of both victory and failure. As organizations globally continue to expand, security professionals are struggling to update operations quickly enough to ensure effective monitoring and response to incidents in their environment. The lack of security professionals makes this even more challenging. Patching systems, scanning for vulnerabilities, protecting against malware and viruses are essential and just plain smart.

Threat Intelligence in the SOC- How can it help mitigate risks?

For most organizations, Security Operations Center (SOC) teams have long since been their first line of defense. These SOC systems efficiently ensure robust cybersecurity and are designed to detect, analyze, respond to, and prevent any cybersecurity incident that the organization might come across. Integrating a SOC within an organization aims to improve its cybersecurity posture, using a blend of state-of-the-art technology and skilled professionals.

Security Doesn't Stop at the First Alert: Falcon X Threat Intelligence Offers New Context in MITRE ATT&CK Evaluation

CrowdStrike recently demonstrated the power of the Falcon platform and its integrated approach to providing robust protection by exposing all attack tactics used as part of the MITRE Engenuity ATT&CK Enterprise Evaluation released in April 2022. The evaluation focused on emulating two of today’s most sophisticated Russian-based threat groups: WIZARD SPIDER and VOODOO BEAR (Sandworm Team).