Latest Insights
cybersecurity industry
- All Topics
- Cybersecurity Industry
- Managed Detection and Response
- Data Protection
- Threat Intelligence
- Regulatory Compliance
- Security Takes a Village
- Cybersecurity News
- Education
- C-Suite Accountability
- Security Hygiene
- Endpoint Detection and Response
- Ransomware
- Assess Outcomes (Not Features)
- Operational Risk Reduction
- Virtual CISO
Cybersecurity Industry
Predictions vs Process: Why "How" Trumps "What"
We recently released our cybersecurity predictions for 2022. This got me reflecting on whether all the time we allocate toward analyzing adversary trends to generate these predictions is worthwhile. I realized that when compared to other predictive efforts, ours stood unique, in both the approach..
Cybersecurity Industry
Managed Detection and Response
log4shell: Patch Necessary, but Insufficient - Proactive Steps Required
December 30th, 2021 Update: Apache released another new version (2.17) after the previous patch was discovered to be vulnerableas well. This article has been updated to reflect the latest recommendations. It remains relevant for those looking to understand what measures beyond patching could be at..
Cybersecurity Industry
Collaboration is Requisite in Cybersecurity
When I was in the government we used to say cybersecurity is a team sport. Different government agencies have different specialized capabilities. During national cyber incidents, we often needed a broad range of expertise to quickly respond and remediate the intrusion, given the stakes and the high..
Cybersecurity Industry
Why Automated Response Is Critical in Stopping Threats Before They Spread
Mean Time to X (Detect, Alert, Respond) orMTTX metrics are frequently chosen when people want to determine a response system's ability to respond to an attack. This system will consist of tooling and people.
Cybersecurity Industry
Top 3 Takeaways from ActZero’s Fireside Chat on Cybersecurity Essentials
Security leaders often struggle to create efficient and effective security operations that will stop the adversary. As the business and threat landscape evolves, many throw junior people and tools like EDRs and SIEMs at the problem to try to keep pace, but mid-sized organizations are falling..
Cybersecurity Industry
Why Darktrace Installs a Hooli Box
When you hear cybersecurity firm Darktrace’s customers talk about their experience with the company, they will tell you about ‘the box’ from Darktrace they installed. The idea behind the box is that it allows you to see malicious network traffic and coordinate to the cloud directly so you can react..
Cybersecurity Industry
Why You Need Incident Response Fire Drills
Practice, practice, practice – practice is key to improvement.
Cybersecurity Industry
Threat Intelligence
The 5 Most Gruesome Cyber Threats
Endpoint Detection and Response
Cybersecurity Industry
A Smarter Way to Detect Suspicious Cloud Logins
As more organizations move their operations online, cloud accounts have become increasingly popular targets for cybercriminals. These adversaries use phishing, password-based attacks, or other methods to gain illegitimate access. The ideal place to detect account takeover, or “ATO”, is at the login..
Cybersecurity Industry
The Deficiency of Mean Time Metrics in Cybersecurity
How many times have you struggled with the question: what does success look like? At ActZero, our data-driven approach to cybersecurity invites us to grapple daily with measuring and evaluating the work we do on behalf of our customers. Like many, we first turned toward the standard metrics used in..
Cybersecurity Industry
Security Takes a Village
Scale Your Security Operation by Focusing on SOCe
An efficient security operation center (SOC) is at the heart of any effort to scale your security operation.
Cybersecurity Industry
Three Key Attributes for Achieving Meaning in Cybersecurity
What’s the goal of our cybersecurity program? How much security do I need? Have I done everything necessary to protect my business?
Cybersecurity Industry
Protect your supply chain from attacks like Kaseya Ransomware
Supply chain attacks exist when a 3rd party’s software or hardware used in an organization’s processes are used to attack it. Because a supply chain attack is launched from a partner or peer, it is often extremely difficult to detect as it is delivered from a trusted channel. Additionally, by..
Cybersecurity Industry
Security Takes a Village
Using Data Science and Automation to Combat Alert Fatigue
It’s no secret that midsize enterprises are struggling with the overwhelming demands of modern cybersecurity.A perfect storm of factors has combined to make the lives of people trusted with securing organizations difficult. Threats are escalating in both complexity and severity — in 2020, the..
Cybersecurity Industry
Optimal Security Alerts: Specific, Relevant, Actionable, Scalable
Part of my job as a Data Scientist at ActZero is to create smart high-fidelity detections, with fancy machine learning or with straightforward analytic rules. When these detections trigger, they usually send off an alert to one of our threat hunters, or directly to a customer’s IT point person. So..