Blog

New tools for faster security incident responses

How quickly could you solve a crime if you had at your fingertips a comprehensive index of all activities occurring at a crime scene before, during, and after the crime? Security professionals have spent considerable amounts of time determining the sequence and timing of events in order to determine how security incidents occurred (e.g., how did attackers obtain access?) and whether data was stolen.

NGIPS – HP TippingPoint Update

In our recently completed Next Generation Intrusion Prevention Systems (NGIPS) test, NSS Labs and HP TippingPoint discovered an anomaly during testing. Fundamentally, the nature of the anomaly was related to a recent CVE, which was being heavily utilized in the wild and as such carried great weight in the Live Stack portion of the NGIPS test.  After working closely together with NSS Labs, HP TippingPoint believes minor adjustments to the profile may provide significant enhancement in the area of security effectiveness in the live stack portion.

Security Orchestration – Integration, Process, and Wise Investments Driven by a Security Conductor

When I am asked by friends to discuss the security breaches that feature ever more frequently in the news, I use a music analogy. Why music? For one thing, I am a fan of traditional classical music; for another, this allows me to describe the roles of security teams without the usual pile of acronyms and product names that are well known to those of us in the security industry but are unfamiliar to those who are not. Most importantly, the music analogy fits because I know that no complex system happens by accident.

Detecting the Invisible Part 3: "Retreat from the Breach"

Our approach to securing the enterprise has changed, and breach detection technology has been largely instrumental in this process. This report from NSS Labs is the final in a three-part series on the impact of the breach detection system (BDS).

As the breach detection market continues to mature, several points are worth noting:

The Best Place for Yesware is Nowhere

A talented security colleague came across a tweet from a company called Yesware and remarked to me that it could be construed as spear phishing with specific language for legal protection. I can see his point, but in pedantically technical language, no, this is not spear phishing. Yesware certainly could be a tool in a spear phisher’s toolbox, but that is not what it is designed for.

Is Yesware Spyware?

Detecting the Invisible Part 2: "Once More Unto the Breach, Dear Friends"

Our approach to securing the enterprise has changed, and breach detection technology has been largely instrumental in this process. This report from NSS Labs is the second in a three-part series on the impact of the breach detection system (BDS).

Breached? Continuous Forensic Analytics Speeds Incident Response

Over the course of the last few years, the number of publicized breaches has risen dramatically, ultimately costing some CXOs their jobs. The irony is that in many cases, the breach itself is not the cause of their dismissal, but rather it is the handling of the situation after the breach is discovered and how quickly the executives can assemble the answers. It takes considerable talent and time (often weeks or months) to work through the incident response (IR) process within most organizations.

Detecting the Invisible

Our approach to securing the enterprise has changed, and breach detection technology has been largely instrumental in this process. This report from NSS Labs is the first in a three-part series on the impact of the breach detection system (BDS).

How Does The Average Enterprise Stay On Top of The Latest Technology?

How Does The Average Enterprise Stay On Top You’ve probably heard the phrase “drinking from a fire hose,” and in the security world, it has never been more applicable than it is today.

NSS Research Reveals NGFW has Strengthening Role in Enterprise

Next generation firewalls (NGFWs) have become perimeter security “table stakes” for enterprise security. Potentially the most important network security investment an enterprise can make, NGFW technology is in high demand. There is considerable differentiation within the market, in spite of the fact that it has yet to reach maturity, and new features such as integrated threat intelligence feeds, cloud forensics, automated black-list population, and sandboxing have made purchasing decisions more complex.

Pages

Go to top