Top Takeaways from ReliaQuest's EXPONENT Customer Conference
ReliaQuest’s annual customer conference, EXPONENT, has concluded! We conducted over 30 sessions during this two-day event. Below, we’ve provided a recap of the key themes and top takeaways. Decentralized Cybersecurity Is Here to Stay Organizations today are faced with an unrelenting pace of technological change. From mergers and acquisitions to supply-chain shifts and pandemic-induced changes in […]What Does It Take to Become a SOC Analyst?
Chris Weckerly, VP of Incident Response SOC analysts (SOC stands for “security operations center”) are a key part of any security organization, including ours here at ReliaQuest. We’ve seen a lot of questions floating around the internet lately about what SOC analysts do, how to become a SOC analyst, and whether you need experience to […]
Customer Spotlight: Kevin Anderson, Cyber Defense Manager, Associated Bank
When Kevin Anderson, Cyber Security Manager, joined Associated Bank in 2014, security consisted of a team of engineers who were responsible for multiple duties. With evolving security threats increasing, Associated Bank took the initiative and grew the department significantly, adding additional functions and skills. Associated Bank has built a model for attracting and retaining top […]
6 Reasons to Prioritize Cloud Visibility in Your Cloud Security Strategy
As the saying goes, “You can’t protect what you can’t see.” That bit of wisdom couldn’t be more on point when you’re talking about enterprise data in the cloud, which is multiplying by leaps and bounds. It’s hard enough to keep track of on-premise data along with associated threats and attempted breaches. When you’ve offloaded […]
Part 2: A Collision Course… SIEM and XDR
In my last blog, I talked about how extended detection and response (XDR) has the potential to fulfill an important promise—but in reality, confusion reigns. XDR as a category doesn’t work. At its core, it is an architecture, one that can revolutionize how we think about security operations. In this blog, we’ll compare SIEM and […]
Part 1: XDR and the Return of Stone Washed Jeans
Remember stone-washed jeans? Well, they are back in vogue! (I don’t know about you, but I hated stone-washed jeans then and still hate them now.) History has a way of repeating itself, from politics to fashion—and now cybersecurity has found itself in this loop. So, how did we get here and where do we go […]
Threat Advisory: HermeticWiper
Category: Tool TLP Level: TLP:WHITE Severity: Medium Campaign Active: 2022-02-23 Campaign Identified: 2022-02-23 Campaign Updated: 2022-02-24 Campaign Details: At 8:00 PM GMT on February 23rd, a data-wiping malware strain named HermeticWiper has been observed affecting devices and organizations in Ukraine, Latvia, and Lithuania. It is believed that HermeticWiper was deployed by a Russian Threat Actor […]
Advisory: HermeticWiper – Increased cyber activities since Russian invasion of Ukraine
Category: Event TLP Level: TLP:WHITE Severity: High Campaign Details: Campaign Active: 2022-02-15 Campaign Identified: 2022-02-15 Campaign Updated: 2022-02-24 Updates: 02/24 12:00 PM GMT Russia has launched an invasion of Ukraine which started with missile and artillery attacks targeting locations near the capital of Kiev and the border city of Kharkiv. Ground troops have since begun […]
When to Go Beyond Traditional MDR
Are traditional managed detection and response services (MDRs) enough, or should you go further? How do you know whether MDR can or can’t meet your enterprise needs? To find out, let’s investigate the limitations of traditional MDR solutions. The Shortcomings of Traditional MDRs Managed detection and response (MDR) is the outsourcing of your security needs […]
New in GreyMatter: Measure Your Readiness Against Cyber Risk
Today we’re excited to announce that, as part of our continuing effort to make security possible for our customers, we are introducing a new set of capabilities in our GreyMatter platform. These capabilities are meant to improve an analyst’s experience during investigations, map coverage to risk scenarios of concern, and measure and communicate actionable metrics […]
No results