Recent Posts

Internet Risk Surface Report by RiskRecon

Posted by CyVent on Apr 1, 2021 12:50:30 PM



Topics: Cyber Security, Partnership

Sepio Case Study: ATM Hardware Attacks

Posted by CyVent on Jul 22, 2020 2:37:22 PM



Sepio Case Study: Invisible Network Devices

Posted by CyVent on Jul 22, 2020 2:34:05 PM



Sepio Case Study: Biometric Bypass

Posted by CyVent on Jul 22, 2020 2:29:05 PM



Choosing the Right Security Tools for Your Organization: A Checklist for CISOs  

Posted by CyVent on Jul 22, 2019 10:25:00 AM

Choose the Right Security Tools for Your Organization

A checklist for CISOs  


Evaluate your information security ROI with this checklist

Calculating ROI for cybersecurity is essential for every CISO who wants to optimize their security spend without compromising. Learn more in our checklist.

Topics: Cybersecurity

Detect Threats Already Inside: Machine Learning in Cyber Security

Posted by CyVent on May 10, 2019 1:50:00 PM

Detect Threats Already Inside: Machine Learning in Cyber Security

Our approach to cyber security needs a refresh. Despite all the attention lavished on keeping bad actors out, headlines show us every day that the perimeter is a sieve.  


To better secure a network, we need to add another toolset that can catch stealthy attackers who avoided the endpoint defenses.

Malware can lay dormant for months, external hackers hide in plain sight, and the risk of an internal attack can’t be underestimated. Using machine learning for cyber security gives businesses the ability to detect if their organization has been infiltrated in ways traditional tools can’t.

Darktrace, a CyVent certified partner, protects companies from silent, stealthy attacks through a combination of unsupervised machine learning and Bayesian mathematics.

Like the human immune system attacks foreign bodies that present a threat to wellbeing, Darktrace’s Enterprise Immune System does the same for organizations. By learning what is normal for an organization and its people, Darktrace is then able to spot anomalies within the environment, detecting previously unknown and in-progress attacks.

Businesses need tools to intelligently monitor their networks and automatically respond to the most serious cyber threats, especially ones that have already made it past the perimeter. Unsupervised machine learning in cybersecurity equips businesses to fight back. Download the white paper from Darktrace to learn more.

Have questions about Darktrace’s Enterprise Immune System technology? We’re available with expert advice to help you evaluate if their solution is the best fit for you. Reach out to one of our advisers.

Topics: Machine Learning

Prevention Is Back: Stop 100% of Threats in Zero-TIme

Posted by CyVent on Apr 16, 2019 1:21:00 PM

Prevention is Back: Stop Known & Unknown Threats in Zero-Time

CISOs and IT teams spend far too much time on remediation, reviewing false positives and searching for tools that can stop the latest threats.  Deep Instinct is bringing prevention back into the conversation, with proven results. 

SE Labs pitted Deep Instinct's software against a range of high-profile, known malware campaigns and a selection of unknown targeted attacks, including:

  • Malware from well-publicized breaches
  • Fileless targeted attacks
  • Exploits targeted at Microsoft file format vulnerabilities
  • Targeted shellcode injection attacks

Each threat was successfully prevented pre-execution with no other processes running — resulting in an industry-first 100% prevention rate and zero false-positives.

Learn more in the Threat Prevention Evaluation Report from SE Labs. Fill out the form to get your copy. 

Topics: Partnership, deep instinct

Critical Infrastructure Cybersecurity: How to Align with Tier 4 NIST Framework Guidelines

Posted by CyVent on Mar 27, 2019 7:29:41 AM

Critical Infrastructure Cybersecurity: How to Align with Tier 4 NIST Framework Guidelines

With the environment, high-value assets, and even human lives at stake, strong critical infrastructure cybersecurity couldn’t be more vital.

Cyberbit, a CyVent partner, is helping organizations adhere to the NIST Framework for Improving Critical Infrastructure Cybersecurity with its Cyberbit SCADAShield.

Though IP connectivity has brought huge operational advantages to critical infrastructure organizations, it has also opened the doors to external threats that air-gapped ICS networks weren’t worried about previously.

The NIST Framework is the industry standard for ICS cybersecurity. With the Cyberbit SCADAShield, organizations can implement the NIST Framework at Tier 4 — the highest level of adaptive security.

According to NIST, “behavioral anomaly detection technology can provide a key security component in sustaining business operations, particularly those based on ICS.”

SCADAShield platform uses ICS-specific behavioral analytics and machine learning to rapidly detect anomalous behavior, including:

  • Continuous ICS threat monitoring
  • Asset discovery
  • Considerations for the Financial Services Security Team
  • Threat intelligence
  • Adaptive risk management

Aligning with the NIST framework at the highest security level requires new technology solutions. In this white paper, learn more about how you can use Cyberbit behavioral analytics and machine learning technology to help keep your ICS network secure in the age of connectivity.

Topics: Cybersecurity

Explore the Challenges & Future of Cybersecurity in Demisto’s State of Incident Response Report

Posted by CyVent on Mar 27, 2019 7:17:23 AM

Explore the Challenges & Future of Cybersecurity in Demisto’s State of Incident Response Report

Technological advancements are making our work and lives easier. But securing innovative new tools? That’s never been more difficult.

Security teams continue to be overworked and understaffed, even as cybersecurity demands greater attention.

Demisto’s “The State of SOAR,” their second annual state of incident response report, takes a comprehensive look at the greatest points of concern for security teams, including:

  • Rising alert volumes

  • The cyber talent shortage

  • Piecemeal processes and measurement

The report also takes a look into the future, diving into solutions that have the potential to address our biggest cyber challenges, including:

  • Threat hunting
  • Automation tools
  • Machine learning solutions

What challenges is your security team facing? Reach out to us with any questions or concerns surrounding incident response. CyVent is an authorized Demisto partner, and we’re here to help you work through today’s challenges and prepare for the future.

Topics: Cybersecurity

Deep Learning in Cyber Security: Reimagining Endpoint Security

Posted by CyVent on Feb 1, 2019 12:20:58 AM

Prevention is the best cure for unknown cyber threats. 

And in the world of endpoint security, prevention is making a comeback.

As cyber criminals became more sophisticated, organizations turned to detection and response to keep their network and endpoints secure. Existing prevention tools simply weren’t strong enough to catch unknown threats.

But with the advent of deep learning, an advanced form of artificial intelligence, organizations can once again embrace prevention solutions to detect never-before seen malware, zero-day, ransomware, and APT attacks.

70% of successful breaches originate from the endpoint, making the need for improved endpoint security solutions critical. Deep Instinct, a CyVent certified partner, is pioneering the application of deep learning for cyber security.

In this white paper, “Reinventing Cybersecurity Prevention with Deep Learning” from Deep Instinct, you will learn about:

  • The evolution of endpoint security, from the antivirus era to behavioral analysis and deep learning
  • Why the prevention approach to endpoint security has returned and why it is important
  • Must-have requirements for achieving real-time unknown threat prevention

If you have questions about deep learning for cyber security, we’re available with expert advice to help you evaluate if the solution is the best fit for you. Reach out to one of our advisors.

Topics: Partnership

Download "Multi-Tenancy Security Solution for MSSPs" from Deep Instinct