
New IDG and ReliaQuest Research Finds Many Security Teams at a Critical Tipping Point with "Security Tech Sprawl"
I’m excited to share that ReliaQuest was named “Security Software Company of the Year” in the 17th Annual Cyber Security Global Excellence Awards® . This award further validates the need for a unified SaaS-based threat detection, investigation, and response platform like GreyMatter that provides CISOs with assurance to advise the business and ensure resilience. Our open […]
Essential Reading
Three Security Metrics that Matter Most to Boards
Four Steps to Adopting Security Automation for More Efficient Security Teams
How We Got Here: Will Open XDR Finally Unify Our Security Environment?
6 Reasons to Prioritize Cloud Visibility in Your Cloud Security Strategy
ReliaQuest Named “Security Software Company of the Year” in 17th Annual Cyber Security Global Excellence Awards®
I’m excited to share that ReliaQuest was named “Security Software Company of the Year” in the 17th Annual Cyber Security Global Excellence Awards® . This award further validates the need for a unified SaaS-based threat detection, investigation, and response platform like GreyMatter that provides CISOs with assurance to advise the business and ensure resilience. Our open […]
RQ Threat Advisory Report: HAFNIUM/Exchange Zero-Days
On March 2, 2021, Microsoft Security Response Center released updates related to vulnerabilities affecting on-premises deployments of Microsoft Exchange Server 2013/2016/2019. Microsoft also revealed details around active exploitation of these vulnerabilities using zero-day exploits. The exploited vulnerabilities span several classifications, including server-side request forgery (SSRF), deserialization, and a set of arbitrary file write vulnerabilities; all […]
Sacking Cybercriminals and Fraudsters at Super Bowl LV
The Super Bowl presents a ton of opportunities for cyber criminals to exploit, both through the target–rich environment surrounding the event itself as well as social engineering attacks that take advantage of the hype.
Security Alert Fatigue? False Positives? Common Problems in Threat Detection And How to Fix Them
If your team is suffering from security alert fatigue, too many false positives, and an overall reactive posture, you’re not alone. Organizations are continuing to invest in a growing suite of cyber security tools, complicating security operations, overwhelming teams, and negatively impacting threat detection. According to a 451 Research Report, 43% of enterprises are unable to act […]
Build a Cyber Threat Hunting Plan With This Step-by-Step Process
Do you and your team want to start proactively threat hunting in your environment? If so, it’s time to dive into the threat hunting steps below, starting with performing research on what you want to hunt for before digging into the data. It can be tempting for security teams to want to dive right in without a […]
Top 3 Mistakes When Simulating Cyber Attacks
Breach and attack simulation (BAS) offers an efficient way to validate and test security controls, threat detection capabilities, logging levels in an environment, and incident response workflows. Simulating cyber attacks in this manner allows for security teams to proactively identify and remediate gaps; however, if not performed correctly, security teams may end up with a […]
Threat Hunting Use Case: Malware & Antivirus
Antivirus (AV) is one of the most fundamental tools that an organization can deploy to provide security to their organization. A typical antivirus solution primarily uses signature–based detections for identifying threats on a system which may not catch the most advanced threats, but it is still helpful in detecting some commodity malware and hacking tools. […]
Security is a Team Sport: How ReliaQuest Adapted GreyMatter Customer Trainings for a Virtual World
The cyber skills gap isn’t going to disappear on its own. It’s time to embrace it and take responsibility for it. It’s up to all of us to take someone who has the desire and ability to learn and provide them with continuous training and development.” – Brian Murphy, ReliaQuest, CEO At ReliaQuest, we make […]
Best Practices for Monitoring and Investigating AWS Events
Cloud computing is a resource that is becoming more affordable, efficient, and widespread in today’s enterprise environments. Having a well-hardened environment will thwart most attacks on your organization’s assets and resources, but what happens when an S3 bucket that your team created years ago was misconfigured along the way and auditing of the security configuration […]
No results