September's digest: Pumpkin spice and security advice
Autumn is here, the kids are back in school, and Christmas decorations are already pushing Halloween decorations off the shelves in most megastores. But instead of racing toward the holidays, we're looking to embrace the calm of a crisp fall day. So throw on that infinity scarf or flannel, sit down with a warm beverage, and sip on some security advice that may help you a latte.
Perfect "pods" for peeping leaves and adversaries
THE KEY TO CLOUD AND ENTERPRISE INCIDENT RESPONSE
Red Canary Principal Readiness Engineer Gerry Johansen joined the Risky Business podcast to discuss incident response (IR) plans and playbooks. Listen or read now >>
A PROACTIVE APPROACH TO THREAT HUNTING IN ENTERPRISE SECURITY
One of Red Canary’s expert threat hunters recently joined the SANS “Wait Just an Infosec” podcast to discuss threat hunting and other capabilities of a world-class SOC. What should we hunt for? >>
Cidery sweet webinars and blogs to root out rotten apples
WEBINAR: THE DETECTION SERIES: REMOTE ACCESS TOOLS
In the YouTube video above, experts from Red Canary and MITRE ATT&CK® analyze common remote access tools, explain why adversaries abuse them, and how you can detect and respond to them.
BLOG: HOW AI WILL AFFECT THE MALWARE ECOSYSTEM AND WHAT IT MEANS FOR DEFENDERS
AI will drive down adversary costs in a wide variety of ways, but is unlikely to impact the state of the art as it relates to malware development or capabilities. Key takeaways and questions >>
WEBINAR: TRAIN HARD, FIGHT EASY: FAST, EFFECTIVE RESPONSE TO MODERN THREATS
Recommended by LinkedIn
It’s time to dust off the old playbooks and update them. Join us and learn how to create or modify response playbooks while also exploring tried-and-true methods for training your team to execute when adversaries come knocking.
BLOG: GLOBAL COALITION OF LAW ENFORCEMENT AGENCIES TAKE DOWN QBOT
The disruption of Qbot is a huge win for law enforcement and defenders alike, but it’s important to remember that delivery affiliates and ransomware operators remain active and will pivot to new malware families. What I need to know >>
Unbeleafable resources
TOP 5 CLOUD INFRASTRUCTURE SECURITY BEST PRACTICES
The cloud enables every organization to improve development processes, decentralize infrastructure ownership, and innovate faster. This guide’s five best practices will help your organization overcome top cloud security challenges. Secure my cloud with confidence >>
INCIDENT RESPONSE & READINESS GUIDE
Timing and response plans could mean the difference between an attempted attack or full-blown compromise. This guide arms security teams with the blueprint for a modern and effective incident response plan. Best practices revealed >>
TOP 15 QUESTIONS TO ASK WHEN EVALUATING MDR SOLUTIONS
When evaluating MDR vendors, organizations should consider several elements, from the provider’s investigation and response capabilities to their depth of detection and beyond. In our MDR Buyer's Guide, we go through the top questions you should be asking before making your final selection. Access my security checklist >>