How to Hire-and Retain-Effective Threat Hunters.
Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.
Accessed on 13 November 2021, 2153 UTC.
Content provided by “DarkReading.com.”
Source:
https://www.darkreading.com/
Please click link or scroll down to read your selections.

Nov 12, 2021
Latest News
The machine learning classifier from Adobe can determine whether system commands are malicious and classify them using a variety of tags useful for security analysts.
Alan Paller, founder of the famed SANS Institute, passed away on Nov. 9.
New report suggests attacker is targeting trusted supply chain companies in order to compromise large numbers of downstream customers.
ClusterFuzzLite is a stripped-down version of continuous fuzzing tool ClusterFuzz that integrates CI tools.
Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure.
Researchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.
Enterprises are more dependent than ever on open source software and need to manage the risk posed by vulnerabilities in components and third-party vendors.
Russian-speaking “Void Balaur” group’s victims include politicians, dissidents, human rights activists, doctors, and journalists, security vendor discloses at Black Hat Europe 2021.
Latest Commentary
How to Hire — and Retain — Effective Threat Hunters
Key characteristics that should be evaluated include curiosity, disposition, and fit with the culture.
Should Our Security Controls Be More Like North Korea or Norway?
When the drive for additional visibility and awareness is led by the business rather than just a SOC team, both the business and security can benefit.
Defining the Hierarchy of Value in Cyber Intelligence
One size won’t fit all as we try to reconcile the need to demonstrate expertise and value with keeping clients and researchers safe.
4 Tips to Secure the OT Cybersecurity Budget You Require
OT security engineers and personnel should approach senior management with an emphasis on risk reduction benefits and with a concrete plan to secure budget and funding before it’s too late.
How to Minimize Ransomware’s Trail of Destruction and Its Associated Costs
One of the biggest mistakes an organization can make is blindly throwing technology at the problem instead of properly investing in building a security team.