Tag: Anomaly Detection

Exploiting Responsibility Gaps: The Space Between Networking and Security

Because security professionals are mainly looking for security events, and security technologies are focused on attacks and abuse, they miss the predictors in network traffic that lead up to a security incident. The other side of this fact is that the networking team is just monitoring for availability and performance management, so adversaries can get into a network and explore all they want as long as they don’t trigger any of the non-security related events. We need to close this gap created by the org charts that paint these areas of responsibility as isolated, because the adversaries are exploiting this day in and day out. READ MORE

Upcoming Webinar: How HP Protects Massive Network with StealthWatch

Lancope will host a complimentary webinar on Tuesday, November 19 at 11:00 a.m. EST (U.S.) to demonstrate how HP incorporates Lancope’s StealthWatch System into its security initiatives. READ MORE

On Advanced Persistent Detection

When we consider the term Advanced Persistent Threat, the logical countermeasure is Advanced Persistent Detection. By finding variance in the normal ebb and flow of network traffic, a.k.a. anomaly detection, we can begin to develop a strategy built on “advanced persistent detection.” The real key to this strategy is unsampled flow data in the form of NetFlow and IPFIX. READ MORE

This Week, Lancope Speaks at East Tennessee Cyber Security Summit

This Wednesday, October 23, Lancope’s Director of Security Research, Tom Cross, will conduct two sessions at the East Tennessee Cyber Security Summit in Knoxville. He will present a session on “combating insider threats” at 9:45 a.m. and a breakout session on “hunting attackers with network audit trails” at 11:00 a.m. READ MORE

“Advanced Threat Detection” Presentation at ISSA Grand Rapids

This week, Lancope Senior Systems Engineer Charles Herring will present at the Information Systems Security Association (ISSA) Grand Rapids Chapter Meeting on the topic of “Advanced Threat Detection and Forensics via NetFlow/IPFIX.” READ MORE