Request a Demo
Welcome to the Cygilant Blog

Three Ways Indicators of Compromise Help SOC Teams

Posted by Kevin Landt on Mar 1, 2018

Threat Intelligence plays a major role in the modern Security Operations Center (SOC). This threat data can help analysts to detect security incidents earlier, take more informed actions, and implement security controls to defend against known threats.

Threat Intelligence includes context about threat actors, their intentions and their methods. It also includes Indicators of Compromise (IOC’s), which include IP addresses, domain names, URLs, file hashes, and more, that are known to be malicious. If one of these blacklisted items shows up in your event logs, it’s a good indicator that your network has been compromised.

5 Steps to Protect Against Ransomware

Posted by James Cote on Feb 15, 2018

Ransomware made waves this year when it exploded onto the internet in a series of headline-grabbing attacks, all of which were attempts to extort businesses for exuberant amounts of money. The concept of ransomware is simple: install malware that encrypts all the files on a workstation, attempt to spread through saved email addresses, and ultimately force the user to pay a ransom to decrypt their data again. This is textbook extortion, highly illegal, and extremely disruptive to organizations being targeted.

Reducing Business Risk

Posted by Miguel De Los Santos on Feb 7, 2018

Keeping the scale in your favor during an average production day always proves to be difficult. The list of vulnerabilities has grown unmanageable.  In many cases, there are lengthy reports to review, spreadsheets to update, and worsePDFs to comb through. Meanwhile, threat actors continue to develop zero-day vulnerabilities along with weaponizing known vulnerabilities; some of which go as far back as 2006.  

GDPR Will Affect US Businesses

Posted by Trevan Marden on Jan 23, 2018

GDPR_EU.jpgYou’ve probably heard by now about GDPR, the General Data Protection Regulation, passed by the EU and set to go into effect in May 2018. At it’s core, the regulation is intended to protect private party’s data and give citizens increased control over how their data is collected, used and stored. It’s important to recognize that the regulation does not apply only to businesses in EU member states, but to any organization who processes the personal data of EU citizens.

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Popular Posts

Posts by Topic

See All