1. Responding to the Cyber Skills Drought with Automation

    Sam Erdheim |

    In our previous blog, Fidelis’ Director of MDR Services, Rae Jewell discussed how 24x7 managed detection and response can help organizations cope with the ever-present cyber-skills drought. This week, we’ll examine how technology that leverages automation can also help organizations address … READ MORE

  2. Responding to the Cyber Skills Drought: The MDR Solution

    Rae Jewell |

    If you ask a CISO today to name the biggest challenges of the job –9 times out of 10, the security skills gapis mentioned.It’s not a myth – the gap iscontinuing to widen and CISOs are feeling the pressure as cyber attacks grow in complexity and are testing enterprises now more than ever. I … READ MORE

  3. The DNA of Detection & Response

    Tom Clare |

    The migration from prevention to detection defenses is driving a new perspective on the DNA required to be successful. Decades of preventive defenses have ingrained concepts of sandboxing, crowd sourced visibility, cloud-based intelligence, and using machine learning anomaly detection to prevent … READ MORE

  4. Emotet Update

    Jason Reaves |

    Earlier this year the Fidelis Threat Research team detailed an update with Emotet involving the use of NetPass and string obfuscation which you can read about here(1). Recently I began researching an Emotet sample that appeared to have been updated yet again. Together with researchers from Flashp … READ MORE

  5. Hacker

    SKIDDIEs and PROs vs. Advanced Deception

    Yishai Gerstle Guy Gilat |

    There are different types of hackers, each with their own characteristics, methods and goals. We can divide them into white hat & black hat categories, we can group them by their skills or by their goals. There are Pentesters, hackers for hire, hacktivists and espionage groups. Some hackers atta … READ MORE

  6. Insider Threats Seeking Privileged Access

    Insider Threats Seeking Privileged Access

    Tom Clare |

    Insider threats are often defined to include external attacks (i.e. phishing) compromising credentials for access to desired resources and data. While true insider only incidents account for less than 10%, adding in external attacks increases the incident percentage beyond 60% with some claims as … READ MORE

  7. Low Risk Deception Deployments

    Tom Clare |

    The topic of deception often brings up controversial thoughts and some misconceptions. Add in reporters looking for the negative or dark side of an interview for a story about deception, and fear keeps building up. Headlines about deception defenses striking back at attackers, engaging and confu … READ MORE

  8. Deep session inspection visibility issues

    Can Deep Session Inspection® overcome visibility issues of Deep Packet Inspection?

    Kaustubh Jagtap |

    In theprevious blog, we talked about Deep Packet Inspection (DPI), its capabilities, and its limitations. One key limitation is the inability to inspect content hidden deep inside the packet. We alsotalked aboutDeep Session Inspection (DSI), a technologydesigned andpatented specifically to overc … READ MORE

  9. Deep Packet Inspection

    Deep Packet Inspection – Is It Enough?

    Kaustubh Jagtap |

    Security analysts oftentimes feel that Deep Packet Inspection (DPI) is a fundamental requirement for detecting malware and tracking network data loss. This tried and tested method has been around since the early 2000s and it absolutely does have merit, but is it sufficient by itself to prevent in … READ MORE