What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
CrowdStrike.webp 2021-12-09 09:00:43 CrowdStrike’s Strategic Counter-Adversarial Research Team (SCAR): Developing the Technology Falcon OverWatch Threat Hunters Need (lien direct) As a human-led managed threat hunting service, CrowdStrike Falcon OverWatch™ is built around the best and brightest analysts in the industry who lead the fight against today’s sophisticated adversaries. But while humans remain the critical ingredient that makes OverWatch so successful, these hunters are also supported by best-in-class technologies that enable them to work at […] Threat Guideline ★★
CrowdStrike.webp 2021-12-09 08:59:37 CrowdStrike Falcon and Humio: Leverage All Your FDR Data in One Place (lien direct) This blog was originally published Nov. 8, 2021 on humio.com. Humio is a CrowdStrike Company. In 2021, Humio and Crowdstrike joined forces to deliver a truly robust security solution. CrowdStrike delivers the industry’s most comprehensive security solution for protecting endpoints and workloads, processing 1 trillion security-related events per day with its pioneering Threat Graph™ technology. […] Threat ★★
CrowdStrike.webp 2021-12-07 20:52:45 5 Common Hybrid IT Security Challenges and How to Overcome Them (lien direct) Digital transformation has pushed organizations to adopt a hybrid IT approach and has created a mix of on-premises and cloud infrastructure that has to be supported and protected.  Unfortunately, while hybrid IT holds significant promise for businesses when it comes to creating efficiencies and speeding the delivery of applications and services, it also introduces a […] ★★★
CrowdStrike.webp 2021-12-07 09:17:25 Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes (lien direct) In a July 2019 blog post about DoppelPaymer, Crowdstrike Intelligence reported that ProcessHacker was being hijacked to kill a list of targeted processes and gain access, delivering a “critical hit.” Although the blog is now a couple of years old, the hijacking technique is interesting enough to dig into its implementation. The hijack occurs when […] ★★
CrowdStrike.webp 2021-12-07 09:14:21 Extend Threat Visibility With Humio\'s Integration With CrowdStrike\'s Indicators of Compromise (IOCs) (lien direct) This blog was originally published Oct. 1, 2021 on humio.com. Humio is a CrowdStrike Company. What is an indicator of compromise (IOC)? An indicator of compromise (IOC) is a piece of digital forensics that suggests that an endpoint or network may have been breached. The ability to monitor for indicators of compromise is critical to […] Threat ★★
CrowdStrike.webp 2021-12-03 09:00:39 End-to-end Testing: How a Modular Testing Model Increases Efficiency and Scalability (lien direct) In our last post, Testing Data Flows using Python and Remote Functions, we discussed how organizations can use remote functions in Python to create an end-to-end testing and validation strategy. Here we build on that concept and discuss how it is possible to design the code to be more flexible.   For our purposes, flexible code […] ★★★
CrowdStrike.webp 2021-12-02 05:16:53 Why Actionable Logs Require Sufficient History (lien direct) This blog was originally published Oct. 26, 2021 on humio.com. Humio is a CrowdStrike Company. Improve visibility and increase insights by logging everything ITOps, DevOps and SecOps teams need historical log data to ensure the security, performance and availability of IT systems and applications. Detailed historical log data is fundamental for understanding system behavior, mitigating […] ★★★★★
Last update at: 2024-05-18 06:08:00
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter