10 tips for effective threat hunting
Attackers don’t think of their success as optional, hence the effectiveness and success of a threat hunting program is critical.
Kane Lightowler | 03 Aug | Read more
Attackers don’t think of their success as optional, hence the effectiveness and success of a threat hunting program is critical.
Kane Lightowler | 03 Aug | Read more
Usually an IT professional who has been threat hunting in an environment for six months, a year, or more, will be regarded as a senior.
Kane Lightowler | 20 Jul | Read more
Every year seems to be ‘the year of something’ in cyber security.
Kane Lightowler | 01 Mar | Read more
Latest statistics show that more than 28 billion people will be connected to the Internet of Things in 2017, rising to 34 billion-plus next year.
Kane Lightowler | 25 Jan | Read more
The ineffectiveness of traditional antivirus (AV) , which catches less than half of noteworthy malicious events, is causing untold damage to organisations worldwide
Kane Lightowler | 08 Dec | Read more
Ransomware continues to proliferate in complexity, volume and rewards for cyber criminals. Their haul is on track to top $1 billion this year, with more than 4,000 attacks occurring each day, according to the FBI.
Kane Lightowler | 28 Sep | Read more
Endpoint detection and response (EDR) is a driving force of evolutionary change in security operations centres (SOC), shedding light into areas where most organisations are blind.
Kane Lightowler | 09 Sep | Read more
Effective digital security needs people as well as technology. Most organisations are aware of the need to staff up to improve their security against cyber-crime, and there is no shortage of options: experts, service bureau, staff training and more.
Kane Lightowler | 09 Aug | Read more
A harsh reality for the information security sector is that the businesses we are asked to protect are battling businesses that are built to attack.
Kane Lightowler | 06 Jun | Read more
The past six months have seen the cyber threat landscape worsen rapidly. Hospitals are under siege from ransomware, breaches are increasingly moving to mobile devices and there has been a successful attack against a public utility.
Kane Lightowler | 16 May | Read more
Each time a vendor terminates support for an operating system or solution, a broad spectrum of organisations are put at risk of failing to meet regulatory and compliance mandates.
Kane Lightowler | 03 May | Read more
“Know your enemy and know yourself and you can fight a hundred battles without disaster”—Sun Tzu Security professionals love to quote Sun Tzu. It can help to change the way security is approached.
Kane Lightowler | 20 Apr | Read more