Top news of the week: 17.02.2022.
Mitre Attack
Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology
Actions to Help Protect Against Russian State-Sponsored Malicious Cyber Activity: • Enforce multifactor authentication. • Enforce strong, unique passwords. • Enable M365 Unified Audit Logs. ...
Seven Key Ingredients to Effective Incident Response
With ransomware attacks on the rise, organizations need to upgrade their incident response processes to improve speed and precision.
How to Make Cybersecurity Effective and Invisible
Cybersecurity should be a shield that protects the business, not a barrier that holds it back.
Lawmakers Introduce Combined Bill for Strengthening Critical Infrastructure Security
U.S. senators introduce a new legislative package that aims to protect critical infrastructure and government networks against cyber threats.
Cado Response Now Integrates with Splunk SOAR to Automate Your Cloud Incident Response Workflow
By Adam Cohen Hillel and Katerina Tiddy The Cado Response integration with Splunk SOAR is finally here! You can now automatically capture critical incident evidence across cloud and ...
Attack Emulation Tools: Atomic Red Team, CALDERA and More w/ Carrie Roberts
Atomic Red Team and CALDERA are two open source attack emulation projects that are mapped directly to the MITRE ATT&CK Framework. This class will provide an overview of the MITRE …
Ransomware Threat Intel: You're Soaking In It!
Organizations need to improve their ability to detect and prevent emerging ransomware attacks.
2021 ICS/OT Year in Review Executive Briefing
The ICS/OT community has long suffered from a lack of insight into cyber threats, vulnerabilities, and incident response observations. The annual Dragos ICS/OT Year in Review reports on how ...