Uncategorized
The further the road… the more XDR
Can we accurately respond to a cyberattack? Can we fully remove the adversary without causing undue business downtime? Today more than ever, […]
Anatomy of an Attack 4 – Top 5 Malware in 2022.
Malware is the weapon of choice of our adversaries – the “arm, deliver and detonate” weapon. According to statistics published on Security […]
Anatomy of Attack # 3 – Malware – Delivery & Exploitation
Malicious software – malware – is undoubtedly the most common tool for “work” of cybercriminals. Thanks to it, the attacker can remotely […]
Cybereason as the overall leader in the KuppingerCole 2022 Leadership Compass for Endpoint Protection, Detection and Response (EPDR) vendors
KuppingerCole Analysts, a leading multinational analytical firm based in Europe, has just selected Cybereason as the overall leader in the KuppingerCole 2022 […]
Why is XDR telemetry something more?
The term "telemetry" refers to data collected by specific devices - in case of our article - devices securing the IT infrastructure. IT Security solutions process events from channels such as e-mail, end devices, servers, cloud instances and the organization's network. As each security platform or product collects/generates different types of activity data, the XDR platform collects telemetry data to detect and search for (known/unknown) threats and assist in root cause analysis.
The term "telemetry" refers to data collected by specific devices - in case of our article - devices securing the IT infrastructure. IT Security solutions process events from channels such as e-mail, end devices, servers, cloud instances and the organization's network. As each security platform or product collects/generates different types of activity data, the XDR platform collects telemetry data to detect and search for (known/unknown) threats and assist in root cause analysis. Read More