Businesses are seeing a 50% increase in cyberattacks per week. That’s according to a report from Check Point Research, where companies reported a bump in cyberattacks during 2021. The increase is in line with a year-over-year trend of increasing attacks. Though 50% is a staggering figure, it is only 13% higher than Check Point’s 2020s findings.
Read moreCategory: NDR
5 NDR best practices
Threats today continue to endanger the security of the enterprise at an alarming rate. In fact, a recent report by Positive Technologies found that cybercriminals can penetrate 93% of company networks. And despite efforts to create robust security platforms, no single security solution will address all of the needs of the enterprise. A layered security strategy continues to be a best practice and the one most IT professionals prefer. As part of the strategy, Network Detection and Response (NDR) plays a pivotal role, as it has for many years. Before we dive into how best to implement an NDR program, let’s cover the history of this security solution.
Read moreLeveraging MITRE ATT&CK and incident correlation to improve incident investigations
Increasingly complex cyber threats are pushing SOC analysts to ‘up their game’. It has become critical to quickly understand how an attacker has gained access, what techniques were used to breach your systems, where they have been, and what they have done. Capabilities such as Incident Correlation and leveraging the MITRE ATT&CK framework are being used to improve the SOC investigative processes.
Read more3 lessons energy and utility cyberattacks have taught
Recent attacks indicate that energy and utility companies need to increase their security posture sooner rather than later. Because energy companies are so entwined with local and global operations, attackers can see significant financial gains, cause widespread infrastructure disruption, or steal coveted intellectual property.
Read moreNetwork intelligence with machine learning
Whether you’re monitoring an enterprise network for performance or security, you need a tool to help collect and process data. Data is good to have, but it’s really just documentation unless you can put it to use. Almost every organization wonders how they can use data to improve network performance or security. Machine learning helps provide an answer to that question.
Read more