This article sheds light on Firewall Logs in incident investigations. We explore key behaviors and patterns for effective threat detection
Read the blogwritten on Mar 05, 2024
by Kenneth Vignali
written on Feb 15, 2024
by Kenneth Vignali
written on Jan 30, 2024
by Kenneth Vignali
written on Jan 22, 2024
by Kenneth Vignali
written on Jan 19, 2024
by Kenneth Vignali
written on Dec 12, 2023
by Kenneth Vignali
written on Dec 05, 2023
by Kenneth Vignali
written on Nov 29, 2023
by Kenneth Vignali
written on Nov 24, 2023
by Kenneth Vignali
This article sheds light on Firewall Logs in incident investigations. We explore key behaviors and patterns for effective threat detection
Read the blogHistorically, security teams would advocate for their IT teams and management to approve the implementation of multi-factor authentication in order to reduce the impact of threats such as brute force attacks against passwords, mitigate fall out from phishing emails and other social engineering related attacks. For context, there are multiple methods of implementing two factor authentication, which includes but is not limited to, SMS based, voice and app based. Once an implementation is in place, this will provide security and incident response teams additional protection and more importantly, additional data points to investigate security alerts.
Read the blogCASB solutions can help your business in addressing risk in cloud-based services, consistently enforce security policies and comply with regulations, even when these services reside beyond your perimeter and out of your direct control. The value stems from the ability to identify high-risk applications, users, and other key risk factors across cloud platforms - a potential blind spot for many businesses.
Read the blogEndpoint detection and response (EDR) provides continuous monitoring and analysis of endpoints, aiding incident response teams in efficiently managing threats and reducing overall response times in cybersecurity operations.
Read the blogThis article explores cyber investigations through leveraging the Security Stack. It sheds light on the role of password reset logs in swift breach detection and mitigation.
Read the blogAs part of our series on how incident response teams leverage different parts of the security stack for investigations, we now are going to look at how anti-virus logs are used and can be used.
Read the blogAs part of our ongoing series regarding how each part of an organization’s security stack helps the incident response and forensic teams perform their analysis, we are going to now discuss Office 365 logs and the details it captures as teams interact with services held there.
Read the blogThis article explores incident response investigations using proxy logs to uncover security gaps in email filtering.
Read the blogMalicious actors regardless of motivation, whether financial or hacktivism, tend to look for the path of least resistance. In many data breaches, when forensic teams investigate the root cause, they end up tracing it back to email as the initial vector of the breach, where it all began. The reason this turns out to be the most lucrative for all attackers is the fundamentals of human psychology.
Read the blogSkyRadar develops and distributes radar training systems (Pulse, Doppler, FMCW, SSR) and tower simulators for universities and aviation academies.
All rights reserved by SkyRadar 2008 - 2024