Logo
15.11.2018

Nachrichten

Blog: The Low Down on Threat Hunting

Recently we announced our 2018 State of Threat Detection survey results and we picked up on some interesting trends around the subject of threat hunting. But what exactly is threat hunting? Who's doing it? And how can you do it too? Find out the answers below: What is ...

lesen
Logo
09.11.2018

Nachrichten

On Demand Webinar: You Can't Detect What You Can't See: Illuminating the Entire Kill Chain

Summary With technology advances and threats seemingly coming from every direction, security environments have become more complex. Sensitive data is no longer locked within the corporate walls as the boundaries have expanded from the network to endpoints to the cloud. ...

lesen
Logo
07.11.2018

Nachrichten

MDR vs MSSP: What to think about when choosing an outsourcing model

Business and government IT workloads are rapidly transitioning from premises-based data centers to cloud service providers (CSPs). But challenges arise when CSP compute instances are ....

lesen
Logo
06.11.2018

Nachrichten

BLOG: Extending Your Network Security to AWS

Read full Blog here: https://www.fidelissecurity.com/threatgeek/cyberdefense/aws-security Business and government IT workloads are rapidly transitioning from premises-based data centers to cloud service providers (CSPs). But challenges arise when CSP compute instances are una

lesen
Logo
05.11.2018

Nachrichten

Fidelis Cybersecurity and Netgate Announce Integrated Network Security Solution for AWS Hosted Applications

Fidelis Network Sensors coupled with Netgate TNSR provides easy-to-deploy cloud mirror port for traffic visibility, threat detection, and data loss and theft detection November 1, 2018 (AUSTIN, TX and BETHESDA, MD) – Fidelis Cybersecurity and Netgate today announced an ...

lesen
Logo
01.11.2018

Nachrichten

Fewer than a fifth of organizations have a dedicated threat hunting team (Tim Roddy)

Threat hunting likely ranks second after artificial intelligence as a leading cybersecurity marketing buzzword and top airport advertising theme. Why not hunt for threats when dwell time between attack infections and detections can take months? Hiring threat hunters could ...

lesen
Logo
30.10.2018

Nachrichten

How confident are you in your organization's threat detection capabilities?

How confident are you in your organization's threat detection capabilities? We asked over 580 #cybersecurity professionals the same question. Check out the 2018 State of Threat Detection Report to find out what they said: Read more here

lesen
Logo
30.10.2018

Nachrichten

BLOG: Strategien für Deception-Techniken: Eindämmung versus Erkennung von Angriffen

Die Diskussionen zu Deception führen oft zum Thema Honeypots und dies kann für Verwirrung sorgen. Sprechen wir dann noch über weitere Begriffe, die im Zusammenhang mit Täuschungstechnologien oftmals genannt werden – wie Breadcrumbs, Decoys (Köder für Angreifer), Fallen, ...

lesen
Logo
25.10.2018

Nachrichten

It's Time to Threat Hunt - THE STATE OF THREAT DETECTION REPORT 2018

Is your organization threat hunting? Nearly half of the professionals who participated in The State of Threat Detection study noted that they didn't have the time to #threathunt, and a third cited lack of skills. ...

lesen
Logo
22.10.2018

Nachrichten

BLOG: Von Honeypots zu autom. Deception & Defense

Eine sehr häufige Antwort, wenn es um Deception (Täuschung) geht, ist ein Verweis auf Honeypots im Bereich der Cyber-Sicherheit. Ja, moderne Deception-Lösungen werden von Honeypots abgeleitet und die Weiterentwicklung dieser effektiven Verteidigung steht im ... Read more:

lesen
Logo
19.10.2018

Nachrichten

When cybersecurity capabilities are paid for without any results... (Article)

Government agencies, like too many large enterprises, have built out increasingly complex and overlapping technology stacks, and this problem is especially prominent in cybersecurity technology. Driven by contracting limitations, lack of manpower and limited training, ...

lesen
Logo
16.10.2018

Nachrichten

SC Media Fidelis Deception™ (Review)

Cyber attacks are not single events, they're processes. Once an attacker has managed to access a network or endpoint they don't know where they are, and they gather intel by searching assets for valuable information and clues about where the desired data or location. Read more:

lesen
Logo
16.10.2018

Nachrichten

threatgeek - BLOG: It's Time to Seek: 3 Ways to Take Detection to a New Level

The year so far has been a busy one – crypto mining is happening more frequently, the volume of cyberattacks is growing and cybercrime continues to be extremely well-funded. To top it off, with the number of devices being used, cybersecurity has never been more complicated. ...

lesen
Logo
11.10.2018

Nachrichten

It's Time to Seek: 3 Ways to Take Detection to a New Level

The year so far has been a busy one – crypto mining ishappening more frequently, thevolume ofcyberattacks is growing and cybercrime continues to be extremely well-funded. To top it off, with the number of devices being used, cybersecurity has never been more complicated. ...

lesen
Logo
10.10.2018

Nachrichten

Fidelis Cybersecurity Announces Support for Microsoft Azure’s Virtual Network TAP

Bethesda, MD – October 10, 2018 – Fidelis Cybersecurity announces support for Microsoft Azure’s high-speed virtual network terminal access point (TAP) to enable continuous mirroring of virtual machine (VM) network traffic, without the use of agents, directly to Fidelis Network ..

lesen
Logo
28.09.2018

Nachrichten

We're Going Native: Introducing the Azure Virtual Network TAP

This week at Microsoft Ignite, Microsoft called cybersecurity the “central challenge of the digital age,” and drew attention to the fact that organizations are spending valuable time and shifting “resources away from their core business mission to defend against, and ...

lesen
Logo
28.09.2018

Nachrichten

threatgeek - BLOG: We're Going Native: Introducing the Azure Network VTAP

Up until now, organizations could only conduct cloud network traffic analysis with the use of agents within VMs. This is changing and here's how. This week at Microsoft Ignite, Microsoft called cybersecurity the “central challenge of the digital age,” and drew attention to ...

lesen
Logo
24.09.2018

Nachrichten

Try Fidelis Network - Start our 15-day Free Trial

Detect Threats Faster Fidelis Network® provides unparalleled network visibility across all ports and protocols, detects threats and prevents data loss. Unlike other solutions Fidelis Network goes beyond inspecting just packets; the technology looks deep into the content ...

lesen
Logo
24.09.2018

Nachrichten

Fidelis Elevate In Action / Live Product Demo (Webinar - Recorded)

See how Fidelis Elevate™ helps organizations shift from a prevention-focused approach to one that prioritizes detection and response. Fidelis Elevate is the only unified security operations platform that automates threat detection and response and prevents data theft. Read more..

lesen
Logo
21.09.2018

Nachrichten

Fidelis Looks to Grow Cyber-Security Platform With New Funding

Fidelis Cybersecurity announced on Sept. 18 that it has raised $25 million in a new round of funding to help grow the company's platform, which provides multiple capabilities for network and endpoint security. This has been a busy year for Fidelis as the company has expanded....

lesen
Logo
13.09.2018

Nachrichten

threatgeek - BLOG: MDR vs. MSSP: Which Solution is the Right Fit for Your Organization?

Often, we hear the term “Security as a Service” and it ends up getting lots of words thrown in front of it like Managed Security Service Provider (MSSP). Buyers should be aware though, that an MSSP is often not the same as a Managed Detection and Response Service. The two ...

lesen
Logo
24.08.2018

Nachrichten

threatgeek - BLOG: Deception Deployment Strategies for the Real World

DECEPTION In nature, deception has been used as both a combat and defense tactic for millennia. The angler fish resides deep in the lightless sea and lures its unwitting prey towards it with an extended dorsal spine - which resembles a fishing pole tipped with a luminous ...

lesen
Logo
24.08.2018

Nachrichten

threatgeek - BLOG: Data Exfiltration in Government Organizations

It’s no secret that US Government Agencies are feeling the pressure – with relentless cyber-attacks – both nation state and otherwise, they are having to strengthen their security posture like never before – in fact, the Federal government has just awarded a $1billion ...

lesen
Logo
17.08.2018

Nachrichten

threatgeek - BLOG: Responding to the Cyber Skills Drought with Automation

In our previous blog, Fidelis’ Director of MDR Services, Rae Jewell discussed how 24x7 managed detection and response can help organizations cope with the ever-present cyber-skills drought. This week, we’ll examine how technology that leverages automation can also help ...

lesen
Logo
07.08.2018

Nachrichten

threatgeek - BLOG: Responding to the Cyber Skills Drought: The MDR Solution

If you ask a CISO today to name the biggest challenges of the job – 9 times out of 10, the security skills gap is mentioned. It’s not a myth – the gap is continuing to widen and CISOs are feeling the pressure as cyber attacks grow in complexity and are testing enterprises ...

lesen
Logo
02.08.2018

Nachrichten

threatgeek - BLOG: The DNA of Detection & Response

The migration from prevention to detection defenses is driving a new perspective on the DNA required to be successful. Decades of preventive defenses have ingrained concepts of sandboxing, crowd sourced visibility, cloud-based intelligence, and using machine learning anomaly ...

lesen
Logo
26.07.2018

Nachrichten

threatgeek - BLOG: Emotet Update

Earlier this year the Fidelis Threat Research team detailed an update with Emotet involving the use of NetPass and string obfuscation which you can read about here(1). Recently I began researching an Emotet sample that appeared to have been updated yet again. Together with ...

lesen
Logo
16.07.2018

Nachrichten

threatgeek - BLOG: SKIDDIEs and PROs vs. Advanced Deception

Insider threats are often defined to include external attacks (i.e. phishing) compromising credentials for access to desired resources and data. While true insider only incidents account for less than 10%, adding in external attacks increases the incident percentage beyond ...

lesen
Logo
13.07.2018

Nachrichten

threatgeek - BLOG: Can Deep Session Inspection® overcome visibility issues of Deep Packet Inspection?

In the previous blog, we talked about Deep Packet Inspection (DPI), its capabilities, and its limitations. One key limitation is the inability to inspect content hidden deep inside the packet. We also talked about Deep Session Inspection (DSI), a technology designed and ...

lesen
Logo
10.07.2018

Nachrichten

threatgeek - BLOG: Insider Threats Seeking Privileged Access

Insider threats are often defined to include external attacks (i.e. phishing) compromising credentials for access to desired resources and data. While true insider only incidents account for less than 10%, adding in external attacks increases the incident percentage beyond ...

lesen
Logo
19.06.2018

Nachrichten

threatgeek - BLOG: Low Risk Deception Deployments

The topic of deception often brings up controversial thoughts and some misconceptions. Add in reporters looking for the negative or dark side of an interview for a story about deception, and fear keeps building up. Headlines about deception defenses striking back at ...

lesen
Logo
18.06.2018

Nachrichten

BLOG: Mauern höher ziehen oder Fakten akzeptieren? Ein Denkwechsel muss her!

Seit einigen Tagen geht eine Diskussion durchs Netz, welche sich um kompromittierte Energieversorger dreht. Hier wurden Office-IT Systeme erfolgreich angegriffen und man befürchtet mittelfristig einen Übersprung auf die Steuersysteme der Stromnetze und in Konsequenz einen ...

lesen
Logo
07.06.2018

Nachrichten

threatgeek - BLOG: Deep Packet Inspection – Is It Enough?

Security analysts oftentimes feel that Deep Packet Inspection (DPI) is a fundamental requirement for detecting malware and tracking network data loss. This tried and tested method has been around since the early 2000s and it absolutely does have merit, but is it sufficient ...

lesen
Logo
01.05.2018

Nachrichten

„Capture the flag“ oder die Wissenslücke hilft, Angreifer abzuwehren

„Capture the flag“ Übungen zeigen, wie schnell Angreifer eine neue Netzwerkumgebung erlernen müssen, um ihren Geräuschpegel zu reduzieren und der Erkennung zu entgehen. Dies setzt die Verteidigung von Cyberangriffen in den ersten Stunden oder Tagen unter Druck, wenn Angreifer...

lesen
Logo
02.04.2018

Nachrichten

Deception: Teil 4/4 - Netzwerk & Applikation Breadcrumbs

Intelligente Deception-Technologien nutzen die Notwendigkeit eines Angreifers aus, so viel wie möglich über den Status im Unternehmensnetzwerk zu erfahren, sobald ein Schwachpunkt erkannt wird. Dies ist ein Prozess und kein einzelnes Ereignis. Wir haben Active Directory und ...

lesen
Logo
01.03.2018

Nachrichten

Deception: Teil 3/4 - Verwendung von File & Data Breadcrumbs für intelligente Deception

File & Data BREADCRUMBS, TEIL 3 EINER SERIE VON VIER BEITRÄGEN Wir haben Active Directory und Credential Breadcrumbs in den vorherigen Posts 1 und 2 behandelt. Jetzt schauen wir uns File & Data Breadcrumbs an und wie sie wichtige Elemente in Ihrem intelligenten ...

lesen
Logo
01.02.2018

Nachrichten

Deception: Teil 2/4 - Breadcrumbs in intelligenter Deception-Technologie

Deception & Decoys, Teil 2: Brotkrumen, bzw. Breadcrumbs, Teil 2 einer Serie von vier Beiträgen In dieser Blog-Reihe werden wir jede der Klassen von Breadcrumbs und Ködern untersuchen, die von Intelligent Deception im Allgemeinen und Fidelis Deception im Besonderen verwendet ...

lesen
Logo
01.02.2018

Nachrichten

Blog: Von Honeypots zu aktiven Deception Defenses

Von Honeypots zu aktiven Deception Defenses Eine sehr häufige Reaktion bei der Erwähnung von „Deception“ ist ein Verweis auf Honeypots im Bereich der Cybersicherheit. Ja, moderne Deception Defenses sind von Honeypots abgeleitet und das Verständnis der Weiterentwicklung dieser

lesen
Logo
01.02.2018

Nachrichten

Operation TradeSecret: Cyber Espionage at the Heart of Global Trade

In late February, Fidelis Cybersecurity observed a strategic web compromise on a prominent U.S. lobbying group that served up malware to a very specific set of targets. The malware we observed has been used exclusively by Chinese nation-state threat actors in our observation...

lesen
Logo
01.01.2018

Nachrichten

Tech Data unterzeichnet Distributionsvertrag mit Fidelis Cybersecurity

Tech Data Deutschland bietet ab sofort die Sicherheitslösungen von Fidelis für KMUs und Enterprise-Unternehmen an: Mit der Security-Automation-Plattform Fidelis ElevateTM und den darin enthaltenen Modulen Fidelis Network™ und Fidelis EndpointTM biet

lesen