Tag
Mitigating Threats
Accelerate Detection and Response and Build a Threat Hunting Program with new GreyMatter Capabilities
Today we’re introducing a new set of capabilities in our GreyMatter Open XDR-as-a-Service platform that allow security operations teams to improve detection, threat hunting and ease of management for the platform. These new features address some of the biggest challenges for security programs, most notability that in spite of investments in multiple tools, security operations […]
Overcoming Five Key Challenges in the Way of Effective Security Operations
According to a recent ReliaQuest survey, enterprises continue to deploy an assortment of security technologies across the network, email, endpoint devices, and the cloud despite an overwhelming number of existing investments, yet these tools are not able to proactively defend organizations against the evolving threat landscape. While individually providing valuable security telemetry, these tools are […]
Mitigate Threats on the Endpoint with ReliaQuest + SentinelOne
ReliaQuest delivers a force multiplier for security operations to increase visibility, decrease complexity and reduce risks. Watch this demo video to follow an investigation leveraging both GreyMatter and the power of the SentinelOne API to mitigate potential threats on the endpoint. In this example, the Sentinel One and GreyMatter integration provides unified visibility and automatically […]
Sacking Cybercriminals and Fraudsters at Super Bowl LV
The Super Bowl presents a ton of opportunities for cyber criminals to exploit, both through the target–rich environment surrounding the event itself as well as social engineering attacks that take advantage of the hype.
Watching the Watchers: Identifying & Responding to Insider Threats
While external threats continue to be the ones that grab headlines, organizations must also contend with threats which are already trusted and behind the lines. In this session presented by ReliaQuest’s CTO Joe Partlow, we’ll review the varying stages of building an insider threat program within an organization, and discuss objectives, lessons learned and how […]
Insider Threat: Reduce the Risk
Amid this new “perfect storm” of insider risk, businesses struggle to detect and mitigate malicious and accidental activities. With that in mind, Tricia Hoyt, former Director of Security Operations and current Director of Customer Development at ReliaQuest, offers insight on how to increase visibility into insider threats and reduce the risk. In this video interview with […]
Credential Dumping Part 2: Credential Theft Prevention in Windows
Credential theft is part of almost all attacks within a network, and one of the most widely known forms of credential stealing is surrounding clear-text credentials by accessing lsass.exe. However, this is only a piece of the bigger picture of the Windows credential model. In Part 1 of the Credential Dumping Series, I took a closer […]
A Defense Approach to Mitigating Phishing Attacks
Purpose-built security tools are designed to solve for the ever-evolving threat landscape led by APTs, Nation-States, and Hacktivists, but is your organization accounting for the internal threats posed by your authorized users? Most phishing attacks require help from the end user to be successful Source: Peter Broelman The latest Verizon Annual Data Breach Investigations Report […]
Proactive Practices to Mitigate the Misuse of Service Accounts
Service accounts, by design, are created to perform specific tasks for services running on endpoints. Depending on the service and how the service account is configured, service accounts can have a range of different privilege levels. Malicious actors understand that service accounts typically have higher privileges than normal user accounts, and often target these accounts […]
No results