Cyber Myths

Truths and Myths About Cybersecurity AI


The marketing messages of Artificial Intelligence software companies often create an aura of mystery and borderline confusion. The cybersecurity industry is a great example of such bewilderment full of perplexing ideas and exaggerated claims. At the end of the day, a security organization must be able to see through the vendor smokescreen and make intelligent purchasing decisions.

Race Against Time in Ransomware Cyber Attacks


The Colonial Pipeline cyber-attack, leaving the US East Coast with a fuel-supply shortage, has been a somber reminder of the broad-scale impact caused by ransomware. Many organizations come to a terrifying admission that sooner or later they may be breached, and they will not catch the intrusion on time. Dwell time is becoming a buzzword in the age of ransomware, referring to the amount of time an attacker remains undetected inside the network. It is a key indicator whether an organization can stop an attack before the damage is done.

Network Detection of Sophisticated Cyber Attacks


The major cybersecurity compromises like SolarWinds and MS Exchange Server have dominated the headlines for a good reason. These types of threats are very real, and the risk exposure keeps getting worse. Network Detection and Response (NDR) is rising up as one of the key defense mechanisms against such high-impact cyber campaigns. 

The Pyramid of Pain in the SolarWinds Cyber Attack


We just witnessed one of the most sophisticated cyber-attacks in history with the supply chain compromise of the SolarWinds software. This nation-state attack combined many unique adversarial techniques hidden under a trusted software update. In summary, this was a flawless campaign that successfully bypassed almost all information security controls. Every cybersecurity organization now faces a question – what to do next

Network Traffic Analysis and Cloud Security


Network traffic mirroring is a relatively new feature on major cloud platforms. As a result, Network Detection and Response (NDR) is now possible not only in on-premise environments, but also in the cloud. In this short OnDemand Webcast, Adam Pumphrey, Chief Operating Officer at Dynamite Analytics, will provide guidance on how to improve Cloud Security with NDR.

What is Network Metadata?


Many cybersecurity vendors use the term network metadata without clearly defining what it is. Generally speaking, metadata is descriptive information about the data, or “data about the data.” Network metadata carries individual traits pertaining to the structure of network protocols and packets. Specifically, it represents telemetry of network connections and the artifacts associated with these connections.

Packet Acquisition in the Cloud


Network Detection and Response (NDR) starts with packet acquisition on the wire also known as network traffic inspection. In this short OnDemand Webcast, Adam Pumphrey, Chief Operating Officer at Dynamite Analytics, will provide guidance on how to use network traffic inspection in Cloud Security.