Blog

Category: Data Driven Security

Introducing STAXX: A Free On-Premise STIX/TAXII Solution

In December of 2014, the Financial Services Information Sharing and Analysis Center (FS-ISAC) and Depository Trust and Clearing Corporation (DTCC) announced the general availability of Soltra Edge, a program designed to help facilitate the sharing of threat intelligence in a more organized and automated manner than over email or other...

Read More

SymHash: An ImpHash for Mach-O

In the past the Windows Portable Executable (PE) format has been analyzed far and wide due to the historical large scale adoption of the platform. In contrast the Mach-O binary format (executable file format used by MacOS X, IOS, and other Mach based systems) has received much less attention. This...

Read More

Evaluating Threat Analytics The Right Way

Cyber-security threats can come from individuals, groups, or automated tools which were deployed by said people. Once entry has been gained, malicious hackers can profit or benefit from exploiting your network or the files therein. Avoiding and minimizing the damage from attacks is preferable, as resolving an incident is a...

Read More

Privacy: a Cyber Report

Privacy is important as a personal matter. In this cyber report, we will discuss the external implications of compromises to both personal privacy and confidentiality for businesses and other organizations. Early reports of privacy crises in the aftermath of a hack dealt mostly with personally identifying information. This is specifically...

Read More

Why We Study Breach Detection Analytics

Preventing cyber-security incidents is ideal, but not an entirely realistic goal. Now that 89% of businesses are reporting a recent network breach, the attitude is shifting to prioritize detection and response. Planning for dealing with the aftermath of a successful breach has been reframed from "if" to "when." The goal being...

Read More

Understanding The Relevance of Threat Feeds

Threat feeds, reports about suspicious web traffic, are not the entire security plan but they are an integral part of it. It is through the intelligence that you can detect, identify and respond to cyber-attacks. In a survey, 63% of users report improved visibility of attack methods. Ideally suspicious activity will...

Read More

Four Reasons You Need A Breach Detection Service

Despite our best efforts to keep out intruders, network breaches occur. In the event a hacker is successful at penetrating your network defenses, you need to know what happened immediately. Still on the rise, external hacking accounts for 99.99% of all breaches as of last year’s studies. Responding quickly...

Read More

Leveraging a TAXII Server to Protect Your Data

We don’t always concern ourselves with how cyber-security applications work internally. TAXII (Trusted Automated eXchange of Indicator Information) is a new threat data format convention one must understand in order to harness. TAXII isn’t an application for sharing threat intelligence. It’s a standard language...

Read More

Data Breach Detection: How It Works And Why You Need It

Data breach detection is a process of collecting, studying and interpreting traffic to identify network threats. Protecting your network from being hacked and misused is an inherent responsibility of amassing valuable data. Big-scale attacks are planned and executed by sentient people, often using a combination of tactics. To protect your...

Read More

How Threat Research Could Save Your Data

Threats become increasingly sophisticated as criminals devise new ways to infiltrate our networks. Research to collect and process new information is needed to continually provide the best possible protection. Threat research is the process of collecting useful information and leveraging it for protection.There is no one particular method for...

Read More
Register for a Free Anomali Account Register now