Archives

Category Archive for: "Security"

ARISTOTLEINSIGHT® AWARDED "MOST INNOVATIVE CYBERSECURITY ANALYTICS" BY CYBER DEFENSE MAGAZINE

AristotleInsight® awarded “Most Innovative Cybersecurity Analytics” by Cyber Defense Magazine, Global Awards for 2018. [...]

Read More

OPERATION ELIGIBLE RECEIVER - THE BIRTHPLACE OF CYBERSECURITY: PRIVILEGED USER MANAGEMENT

Over 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The exercise was designed to test the response capabilities of critical [...]

Read More

OPERATION ELIGIBLE RECEIVER - THE BIRTHPLACE OF CYBERSECURITY: VULNERABILITIES

More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose of the exercise was to test the response capabilities of critical Department of Defense [...]

Read More

OPERATION ELIGIBLE RECEIVER - THE BIRTHPLACE OF CYBERSECURITY: CONFIGURATIONS

More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose of the exercise was to test the response capabilities of critical Department of Defense [...]

Read More

WARNING SIGNS FOR MANAGING CYBERSECURITY

In 1997, the NSA attacked the Department of Defense information infrastructures and attempted to breach their network. The attack was codenamed Operation Eligible Receiver 97 [...]

Read More

ARISTOTLEINSIGHT® ANNOUNCES VULNERABILITY GATEWAY GRC IN VERSION 7.9

AristotleInsight® has introduced Vulnerability Gateway (VG) GRC in its latest release. The VG GRC feature continuously identifies risks and directs users on how to remediate them, all while [...]

Read More

EXPLAIN VULNERABILITY & RISK METRICS TO MANAGEMENT

Sergeant Laboratories is excited to announce the launch of a new information series to highlight top issues present in the information security industry. To launch this important new series, [...]

Read More

ARISTOTLEINSIGHT’S® DIRECTIONAL MATRIX PROVEN INVALUABLE FOR REAL-WORLD CYBER SECURITY SITUATION

Sergeant Laboratories is excited to reveal that its flagship product, AristotleInsight, proved key in helping a customer identify an advanced persistent threat (APT) cyber attack. The client [...]

Read More

HUNT TEAMS – STILL A GOOD IDEA

Hunt Teams — not a new concept to cyber security, though not well known — are groups of cyber investigators that actively seek out threats on a network. What makes Hunt Teams unique [...]

Read More

MANAGEMENT BY MEANINGFUL OBJECTIVE

The seemingly continuous disclosure of information security failures demonstrates the consequences of bad governance and bad management.  Revered executive teams, boasting MBAs from our most [...]

Read More

ARE CYBER SECURITY VENDORS THE WORSE CRIMINALS

There is no doubt that those who maliciously attack IT environments or steal data are criminals who need to be prosecuted.  Unfortunately, some of the inventive malware used to commit crimes, [...]

Read More

INFO SECURITY’S LACK OF SOLUTIONS TO TRACK, TREND, AND MEASURE PROCESSES

The security and compliance industry is advancing at a frantic rate, yet due to years of perceived unimportance, still lags behind other departments of enterprise.  In other words, security and [...]

Read More

THE CHALLENGE OF BOARD ROOM BUY IN

One of the top complaints raised by CISOs and CSOs is a lack voice in the boardroom.  From David Barton, CISO at Websense in an article for csoonline.com: “Too many CISOs are relegated to being [...]

Read More

MORE RULES DOESN’T EQUAL BETTER SECURITY

The marketing for just about every SIEM type solution available touts huge numbers of “built-in” or “out of the box” rules included in the solution.  The assumption seems to be that 700 built-in [...]

Read More

CUTTING THROUGH THE FOG OF MORE

Originally published via LinkedIn over a year ago, the problem of “The Fog of More” still exists.  Security professionals still spend too much time fighting to install, configure and maintain [...]

Read More

THE FRAUD TRIANGLE

The sides forming the standard business fraud triangle are opportunity, pressure, and rationalization.  While the triangle was developed well before we became worried about insider threats to information [...]

Read More

TRACKING THE AVERAGE TIME TO PATCH

In the past we have discussed prioritizing vulnerabilities, and the importance of eliminating mistakes from the patching process.  Today, we discuss a more basic question: Is your vulnerability [...]

Read More

PRIORITIZING VULNERABILITIES

Even organizations with a well-oiled vulnerability detection and patch implementation processes struggle to keep pace with the endless stream of newly discovered vulnerabilities.  Although we [...]

Read More

PREVENTION VS DETECTION? THE ANSWER IS UNDERSTANDING

There is an ongoing discussion within the security and compliance community (fueled by vendors) about the value of preventing attacks immediately, versus the value of detecting them once they [...]

Read More
Schedule a Demo