Taking Aim at Cyber Attackers

Powered by data analytics, cyberthreat hunting enables agencies and companies to proactively hunt for and detect security threats, adding another component to basic security hygiene.

Read more here.

5 Things To Consider With A Threat Hunting Program

David Bianco, a security technologist at Sqrrl Data Inc. who has developed a threat hunting maturity model for threat hunting, has described threat hunting as “the collective name for any manual or machine-assisted techniques used to detect security incidents.”

Read more here.

Book Review: There Will Be Cyberwar

Security Analytics (SA) is becoming an important capability in threat management. SIEM data and network traffic is examined, parsed, and analyzed to recognize when an attack is under way. Early practitioners of SA had to use various labor-intensive tools to do these functions, but new companies like …Sqrrl… are automating the process.

Read more here.

Threat Hunting: Open Season on Cyber Threats

Most organizations are involved in threat hunting to some extent, according to results of a new survey to be released by SANS Institute during a two-part webcast on April 14 and April 15.

“Every hour of every day you are either hunting or being hunted,” says Eric Cole, PhD, SANS Analyst and network security expert. “The only question you have to ask is which side do you want to be on?”

Read more here.

DLT Solutions Partners With Sqrrl Enterprise to Enhance Threat Detection and Response Platform Offerings

It was announced on March 1st by Herndon, Va.-based DLT Solutions that it has partnered with Sqrrl Enterprise in an effort to bring Sqrrl Enterprise’s solutions to government agencies. Sqrrl Enterprise is a threat detection and response platform that allows organizations to seek out and disrupt advanced cyber threats through the use of User and Entity Behavior Analytics (UEBA).

Read more here.

RSA Conference Blue Suede Shoes

Another theme heard a bit more loudly at this year’s RSA was enabling cybersecurity teams to go on the hunt for a proactive, lean-forward strategy. Let’s not call that turning the tables and going on the offense per se, but rather initiative-based detection. And doing so is a thing of big data-driven cybersecurity analytics in the wheelhouse of the likes of LogRhythm and Sqrrl.

Read more here.