September's digest: Pumpkin spice and security advice
We apologize for the puns already...

September's digest: Pumpkin spice and security advice

Autumn is here, the kids are back in school, and Christmas decorations are already pushing Halloween decorations off the shelves in most megastores. But instead of racing toward the holidays, we're looking to embrace the calm of a crisp fall day. So throw on that infinity scarf or flannel, sit down with a warm beverage, and sip on some security advice that may help you a latte.


Perfect "pods" for peeping leaves and adversaries

THE KEY TO CLOUD AND ENTERPRISE INCIDENT RESPONSE 

Red Canary Principal Readiness Engineer Gerry Johansen joined the Risky Business podcast to discuss incident response (IR) plans and playbooks. Listen or read now >>


A PROACTIVE APPROACH TO THREAT HUNTING IN ENTERPRISE SECURITY 

One of Red Canary’s expert threat hunters recently joined the SANS “Wait Just an Infosec” podcast to discuss threat hunting and other capabilities of a world-class SOC. What should we hunt for? >>


Cidery sweet webinars and blogs to root out rotten apples

WEBINAR: THE DETECTION SERIES: REMOTE ACCESS TOOLS 

In the YouTube video above, experts from Red Canary and MITRE ATT&CK® analyze common remote access tools, explain why adversaries abuse them, and how you can detect and respond to them.


BLOG: HOW AI WILL AFFECT THE MALWARE ECOSYSTEM AND WHAT IT MEANS FOR DEFENDERS 

AI will drive down adversary costs in a wide variety of ways, but is unlikely to impact the state of the art as it relates to malware development or capabilities. Key takeaways and questions >>


Registration link for Red Canary webinar

WEBINAR: TRAIN HARD, FIGHT EASY: FAST, EFFECTIVE RESPONSE TO MODERN THREATS 

It’s time to dust off the old playbooks and update them. Join us and learn how to create or modify response playbooks while also exploring tried-and-true methods for training your team to execute when adversaries come knocking.

Save my spot >>


BLOG: GLOBAL COALITION OF LAW ENFORCEMENT AGENCIES TAKE DOWN QBOT 

The disruption of Qbot is a huge win for law enforcement and defenders alike, but it’s important to remember that delivery affiliates and ransomware operators remain active and will pivot to new malware families. What I need to know >>



Unbeleafable resources

Top 5 Cloud Infrastructure Best Practices

TOP 5 CLOUD INFRASTRUCTURE SECURITY BEST PRACTICES 

The cloud enables every organization to improve development processes, decentralize infrastructure ownership, and innovate faster. This guide’s five best practices will help your organization overcome top cloud security challenges. Secure my cloud with confidence >>


Cover of Incident Response & Readiness Guide

INCIDENT RESPONSE & READINESS GUIDE 

Timing and response plans could mean the difference between an attempted attack or full-blown compromise. This guide arms security teams with the blueprint for a modern and effective incident response plan. Best practices revealed >>


Cover of MDR Buyer's Guide

TOP 15 QUESTIONS TO ASK WHEN EVALUATING MDR SOLUTIONS 

When evaluating MDR vendors, organizations should consider several elements, from the provider’s investigation and response capabilities to their depth of detection and beyond. In our MDR Buyer's Guide, we go through the top questions you should be asking before making your final selection. Access my security checklist >>

To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics