Our Views On Automating Cyber Defense Including Malware Removal and Return to a Known Good State

number-of-companies-580x434

Threat actors are increasingly automating their attacks, making defense harder and overwhelming incident response teams. Defenders have long looked to automated discovery as a means to mitigate this threat, but until recently, mass automation and response/threat removal hasn’t been a viable option. With changes in technology, enterprise cyber security professionals can now leverage automated in-line […]

New Video: Automating Your Cyber Defenses Including Malware Removal

global-technology

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise.  It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in automating security response. Additional context into this topic is […]

Consumer Reports: Digital Threats and the Cyber Gap

cybersecuritylock

Another prominent research organization, Consumer Reports, has investigated American victims of digital crime and quantified American responses to the growing number of cyber attacks. Its most recent cyber report, Your Secrets Aren’t Safe surveyed thousands of American consumers regarding digital security, vulnerability, and thefts and offers suggestions for limiting one’s risk for future attacks. The findings: 62% […]

White Paper: Automating Your Cyber Defenses Including Malware Removal

automatingmalwareremoval

Threat actors are increasingly automating their attacks, making defense harder and overwhelming incident response teams. Defenders have long looked to automated discovery as a means to mitigate this threat, but until recently, mass automation and response/threat removal hasn’t been a viable option. With changes in technology, enterprise cyber security professionals can now leverage automated in-line […]

Continuous Monitoring – Part 2

Federal CM Model

I previously wrote about the various “functional areas” of continuous monitoring. According to the federal model, there are 15 functional areas comprising a comprehensive continuous monitoring solution, as shown in the graphic below: These functional areas are grouped into the following categories: Manage Assets Manage Accounts Manage Events Security Lifecycle Management Each category addresses a […]

Continuous Monitoring – Part 1

number-of-companies-580x434

Continuous monitoring has become a major focus area in cybersecurity. From customers to experts to standards bodies, a consensus is building that says continuous monitoring will vastly improve the security of our networks and critical infrastructure. So what is it?! We can provide a simple explanation by using a physical security example. Let’s suppose that you […]