3 Strategies for Faster Threat Detection and Response

Posted by Fuel HQ on Jan 9, 2018 10:51:53 AM

Tuseday, January 9, 2018

The ability to detect an attack and respond to it quickly can be the difference between a minor incident and a breach that costs resources and reputation. The good news is that organizations are making strides in security breach detection, according to the 2017 Trustwave Global Security Report, which examines the results of thousands of investigations into security incidents. 

When looking at incidents in 2016, the median time from intrusion to detection of a compromise fell to 49 days, down from 80.5 days in 2015. As tools such as managed security service (MSS) providers and artificial intelligence are more widely developed and deployed, the median time between intrusion and detection could fall even further this year.

Here are three strategies to consider when looking to improve detection and response before threats take root and cause damage.

Read More

Topics: Cybersecurity, Fuel Webcast, Fuel Education, Palo Alto Networks, threat prevention, Data Breaches, Webinar, artificial intelligence, security tools, strategies for security, cybersecurity tools

Cybersecurity Question of the Month: April

Posted by Fuel HQ on May 15, 2017 8:00:00 AM

Each month, we ask Fuel members to weign in with their opinions on the Cybersecurity Question of the Month, and we’re sharing their answers here.
 
Phil De Meyer, a senior network administrator, and Paul Carter, an information security engineer, are members of Fuel’s Editorial Subcommittee under the Community Development Council. Paul and Phil shared their thoughts on the most recent Cybersecurity Question of the Month.
 
In the past, an IT perimeter for network security could be more easily defined and contained. Now, there are numerous devices that break traditional perimeter security including: applications that traverse through firewall policies; mobile devices; IP-enabled devices internal to the network; external devices that are allowed on the internal network 'temporarily;' wireless access points that are unknowingly deployed; and direct internet access from devices.
 
What are the limits of a ‘perimeter-oriented’ security posture? What approaches do you take to keep ever-changing networks secure?
Read More

Topics: Cybersecurity, Hot Topic, threat prevention, threat intelligence, perimeter, cybersecurity question of the month

Cybersecurity Question of the Month: March

Posted by Fuel HQ on Apr 19, 2017 9:00:00 AM

Each month, we ask Fuel members to weign in with their opinions on the Cybersecurity Question of the Month, and we’re sharing their answers here.

Christopher Russell, a network security consultant and SIG member, and Paul Carter, an information security engineer and member of the Fuel Community Development Council, shared their thoughts on the following question: How can cybersecurity professionals leverage artificial intelligence (AI) / machine learning (ML) frameworks to implement predictive security measures?
Read More

Topics: Cybersecurity, Hot Topic, threat prevention, machine learning, threat intelligence

Fuel Voices: Identifying IoT Devices on Your Network

Posted by Fuel HQ on Dec 7, 2016 5:34:27 PM


phil_de_meyer.jpg

Fuel Member Phil De Meyer, a Senior Network Administrator at a mid-sized insurance company, examines the recent Dyn attack, the impact of IoT devices, and the growing sophistication of botnet attacks. Read on for more information on how to recognize, mitigate and prevent these kinds of attacks within your own organization.
Read More

Topics: Cybersecurity, Fuel News, Hot Topic, internet of things, iot, threat prevention

Posts by Topic

see all

Fuel For Thought

The latest and greatest in cybersecurity news, trends, and technical resources. Insights and analysis come from expert users of Palo Alto Networks technology, hand-picked from among the Fuel community

Subscribe to Blog Updates

Recent Posts

Posts by Topic

see all