A paradigm shift is occurring, regarding APT (the advanced persistent threat, a prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period of time.) What kind of threat is an APT? Everyone says it’s...
Prevention Is Ideal But Detection Is a Must Strategy When I say, “prevention is ideal but detection is a must,” I’m talking about preventing the adversary from penetrating, and really focusing in on these areas. We can limit the information that’s out there. We...
No matter what we do, no matter what we put in place, we will not be able to prevent every attack. We will not be able to stop this adversary. We are going to get targeted. Some people don’t want to accept the reality that we are going to get compromised. I was...
Peeling Back the Onion on Threat Hunting Listen in for great threat hunting insights from Bob Stasio, program director of cyber threat hunting and analysis at IBM Security, and special guest Dr. Eric Cole, founder of Secure Anchor Consulting, on IBM’s Security...
This is the third installment in a three-part series on threat hunting by Dr. Eric Cole published on the IBM SecurityIntelligence blog. Be sure to read Part 1 and Part 2 for more information. The purveyors of modern threats are not trying to simply deface your website...