Mar 2018

  1. Fidelis blog: A SOC under siege: alert fatigue

    A SOC Under Siege: How to Reduce Alert Fatigue

    Wednesday, March 28, 2018
    I recently sat down with a SOC analyst from a large e-commerce vendor who showed me his daily workflow. He walked through how he had different data sources pumping into his SIEM, which spit out lots of alerts. Then he walked through a few examples, starting with the alert from the SIEM and then... READ MORE
  2. Five Key Components of Active Cyber Defense

    5 Key Components of an Active Cyber Deception Defense

    Monday, March 26, 2018
    The goal of cyber deception is to more effectively detect attacks that have infiltrated an organization’s network, to confuse and misdirect the attacker, and to understand what assets have been compromised. Remember, deception defenses can leverage the attackers’ knowledge gap while they try to... READ MORE
  3. Fidelis SOC under siege

    A SOC Under Siege: Alert Overload and Cyber Skills Shortage

    Thursday, March 22, 2018
    A SOC Under Siege: Alert Overload and Cyber Skills Shortage One of the key issues in cybersecurity today is the skills shortage – there simply are not enough cybersecurity professionals to go around in the everyday battle against cybercriminals, nation-states and hacktivists. According to the... READ MORE
  4. Most Popular Decoys and Breadcrumbs for Deception Defense

    Popular Decoys and Breadcrumbs for Deception Defense

    Monday, March 19, 2018
    As we saw in our previous blogpost, creating a knowledge gap for your attackers allows you to divert them and slow them down in their quest for information. At the same time, knowing what attackers desire creates the opportunity for an active, intelligent defense to lure, detect, and defend. This... READ MORE
  5. The knowledge Gap

    Knowledge Gap Impact with Deception Defenses

    Monday, March 12, 2018
    Capture the flag exercises show how quickly attackers can learn a new network environment to reduce their noise levels and evade detection.  This puts pressure on detection defenses in the first few hours or days when attackers are likely to be noisier.  This concept is known as the ‘knowledge gap... READ MORE
  6. DNS plumbing leak

    Is Your Network's DNS Plumbing Leaky?

    Monday, March 5, 2018
    Introduction: As detection mechanisms grow more sophisticated, malware developers try new methods to evade. Recently, there has been a growing trend to exfiltrate data and issue commands to malware via the DNS protocol. DNS Command & Control and DNS exfiltration can be successful because DNS... READ MORE