Source |
ProofPoint |
Identifiant |
8412833 |
Date de publication |
2023-11-16 14:15:19 (vue: 2023-11-16 12:07:17) |
Titre |
Informations exploitables: simplifier l'explication des menaces via le résumé de la condamnation Actionable Insights: Simplifying Threat Explainability via the Condemnation Summary |
Texte |
In this blog series we cover how to improve your company\'s security posture with actionable insights. Actionable insights are a critical tool to help you improve your security posture and stop initial compromise in the attack chain. You can use them to identify and respond to potential risks, enhance your incident response capabilities, and make more informed security decisions.
In previous actionable insights blog posts, we covered these topics:
People risk
Origin risk
Business email compromise (BEC) risk
Ensuring proper risk context
Risk efficacy
Telephone-oriented attack delivery (TOAD) risk
Threat intelligence
Your risk profile
In this post, we are excited to announce the new TAP Condemnation Summary-which is available to all Proofpoint Targeted Attack Protection (TAP) customers who use the Proofpoint Aegis threat protection platform. We\'ll explain why it is an invaluable resource and we\'ll explore some of its key reports.
Threat explainability: Introducing the Condemnation Summary
In the ever-evolving cybersecurity landscape, clear communication and rapid understanding of email threats are essential. Proofpoint introduced the Condemnation Summary to enhance threat visibility and explain-in plain, everyday language-why a particular threat is condemned.
The summary makes it easier for both technical and nontechnical users to comprehend email threats. You can find the TAP Condemnation Summary in the Evidence section of the threat details page for any individual threat within your Aegis platform.
Let\'s explore how this new feature can help your business.
Insights: What you can learn from the Condemnation Summary
The Condemnation Summary helps demystify email threats and streamline the decision-making process for threat remediation. Here\'s what you can expect from this innovative feature.
User and VIP insights
The Condemnation Summary includes a highlights card that spotlights impacted users and VIPs. With drilldown options and actionable items, you can quickly determine who is affected. You can use these insights to understand the steps you need to take to mitigate the threat.
Details about affected users shown in the Condemnation Summary.
Threat state overview
This section of the summary breaks down the state of the threat or campaign, complete with timestamps. A chronological view provides you with a clear understanding of how the threat evolved, so you can assess its severity and impact.
The threat state overview section in the Condemnation Summary.
User-friendly descriptions
The Condemnation Summary offers high-level observations from our behavioral and machine learning detection layers. Threats are described in everyday language. So nontechnical users can better grasp the nature of a threat and its potential consequences.
High-level observations in plain language in the Condemnation Summary.
Source attribution
It\'s helpful to understand where a threat originated. Condemnation Sources gives you insight into which sources contributed to the detection and condemnation of the threat.
The Condemnation Sources section in the Condemnation Summary.
Targeted controls: Taking action
The Condemnation Summary isn\'t just a feature for visibility or explainability. It\'s a tool for action. Here\'s how to make the most of this new feature:
Mitigate threats faster. With user and VIP insights, you can respond promptly to threats that are impacting specific individuals. Take immediate actions to protect these users and mitigate risks.
Improve your communication about threats. The user-friendly descriptions in the Condemnation Summary make it easier to communicate threat details to nontechnical stakeholders. This, in turn, helps to foster better collaboration around security across your business.
See how threats evolve. When you have a timeline of a threat\'s progression, you can assess how a threat evolved and whether it is part of a broader campaign.
Track where threats come from. It is cruci |
Envoyé |
Oui |
Condensat |
about accessible across action actionable actions action addition aegis affected against ahead all also announce any are around assess assessment attack attribution available bec behavioral best better blog both breaks broader business campaign can capabilities card chain chronological clear collaboration come communicate communication company complete comprehend compromise condemnation condemned confidence consequences context contributed controls: cover covered critical crucial customers cybersecurity dashboard data decision decisions defend delivery demystify described descriptions descriptions detail details detection determine down drilldown easier effective efficacy email empowers enhance ensuring era essential ever everyday evidence evolve evolved evolving excited expect experts explain explainability explainability: explanations explore faces facing faster feature feature: find form foster free rapid friendly from gives grasp have help helpful helps here high highlights how identify immediate impact impacted impacting improve incident includes increase indicate individual individuals informed initial innovative insight insights insights: insights intelligence introduced introducing invaluable isn items its just key know landscape language layers learn learning let level machine make makes making may mitigate more most nature need new nontechnical observations offers one options oriented origin originated overview overview page part particular patterns people picture plain platform post posts posture potential previous process profile progression promptly proofpoint proper protect protection provide provides quickly rapid recurring remediation reports request research resource respond response risk risks risks risk section security see series severity show shown simplifies simplifying some source sources specific spotlights stakeholders state stay step steps stop streamline summary summary swift take taking tap targeted technical telephone them these the proofpoint threat threats timeline timestamps toad tool toolkit topics: track turn understand understanding use user users uses valuable view vip vips visibility vital ways what when where whether which who why within your |
Tags |
Tool
Threat
Technical
|
Stories |
|
Notes |
★★★
|
Move |
|