Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

November 2021

The Growing Cybersecurity Risks to Retail Organizations

November and December can be particularly stressful for retail organizations—and not just because of the holiday madness. As the volume of transactions ramps up during the holiday season, IT teams must be on high alert for threats buried in a sea of routine activity. But given the exponential growth of ecommerce, they also need to stave off cyber threats.

Validating Arctic Wolf's Incredible Voyage

One of my favorite books is “Endurance: Shackleton's Incredible Voyage” by Alfred Lansing. I encourage you to read it if you haven’t. Here is a brief synopsis of the true-to-life story: In August 1914, polar explorer Ernest Shackleton boarded his ship, the Endurance, and set sail for Antarctica, where he planned to cross the last uncharted continent on foot.

What is a Security Operations Center (SOC)?

A security operations center (SOC) is a centralized facility that unifies an organization’s security monitoring across all IT infrastructure. SOCs function as a hub for information security personnel and the processes and technology needed to detect, monitor, and remediate cyber threats through real-time data analysis.

Cyber Insurance: New Coverage Restrictions Expected in 2022

Get ready for upcoming changes to cyber insurance policies. Due to risk associated with the increase in remote work, insurers are more likely to initiate in-depth cybersecurity risk analyses of companies seeking to purchase or renew policies, the Wall Street Journal reports. The adoption of stringent privacy regulations in the United States and abroad could also justify additional scrutiny by insurance companies during the initial underwriting and renewal process.

How Arctic Wolf Improves Security for Financial Institutions

While data breaches are never good news for any business, they can be especially catastrophic in the financial industry. The sheer amount of sensitive personal data that moves through the average banking institution on a normal day creates a seductive target for cybercriminals and a potential nightmare for security administrators. As a result, finding the right cybersecurity solution that can be tailored to the needs of financial institutions a must.

Introducing The Complete Security Awareness Plan and Strategy Guide

Arctic Wolf security awareness program experts—who created security awareness programs for Disney, Sony, as well as our Managed Security Awareness solution—recently produced The Complete Security Awareness Plan and Strategy Guide to help you evaluate and elevate your own security awareness program.

The Top Cyber Attacks of October 2021

October marked a dubious milestone for cybersecurity. A report from the Identity Theft Research Center confirmed that the number of cyber attacks reported through the first nine months of the year exceeded the total recorded for the entirety of 2020. And not by a small margin either—attacks are up 17% in 2021 compared to last year. Clearly, hackers have been busy, as have the cybersecurity experts tasked with mitigating the damage.

Stories from the SOC - Powershell, Proxyshell, Conti TTPs OH MY!

In the second half of 2021 the AT&T Managed Threat Detection and Response (MTDR) security operations center (SOC) observed an increasing number of attacks against vulnerable Exchange servers. A number of these attacks were attempting to leverage proxyshell vulnerability to gain access to customer’s networks.

Arctic Wolf Continues on Explosive Growth Trajectory

This week marks our mid-year kick-off. It’s our all-company meeting that, like Arctic Wolf, gets bigger each year with hundreds of new team members joining us from around the world—many for the first time. With so much new hiring (we’re on pace to nearly double ourselves, again), I’m continually reminded of our Wolf Pack’s talent, dedication, and drive for success, and I’m proud to work alongside these professionals daily.

Understanding The 2021 Gartner Market Guide for Managed Detection and Response Services

We believe, a Market Guide defines a market and explains what clients can expect it to do in the short term. With the focus on early, more chaotic markets, a Market Guide does not rate or position vendors within the market, but rather more commonly outlines attributes of representative vendors that are providing offerings in the market to give further insight into the market itself. We feel the Gartner Market Guide helps organizations learn about the below.

Going Native: A Cloud-Shift Strategy for Your Security Operations Team

The shift to the cloud has greatly accelerated during the past year, and with that shift most cybersecurity incidents now involve cloud infrastructure. According to the 2021 Verizon Data Breach Investigations Report, 73% of cybersecurity incidents involved cloud assets — a 27% increase from last year. The 2021 IBM Security X-Force Cloud Threat Landscape Report also found there are 30,000 cloud accounts potentially for sale on dark web marketplaces.

XDR: Demystifying the Hottest Cybersecurity Buzzword

Extended detection and response (XDR) has transpired into a market description that, in my not so humble opinion, proves to be as troublesome as the phrases “next gen” or “machine learning” were from 2016 to 2020. I’ll quote myself from a popular blog post from my time at Gartner: Naming aside, the one thing that all InfoSec commentators agree on is that XDR is an evolution of the endpoint-centric approach pioneered by legacy security vendors.

Arctic Wolf Cloud Detection and Response

The cloud has changed the way we work. Accelerate your cloud transformation and have confidence your business is secure–with Arctic Wolf Cloud Detection and Response. Built atop the cloud-native Arctic Wolf platform, Cloud Detection and Response allows you to experience an effective way to secure activity across both infrastructure as a service platforms–like AWS, Microsoft Azure, and Google Cloud Platform, and applications–such as Microsoft 365, Salesforce, Google Workspace, Box, and Workday.

Increase SOC Effectiveness with Streaming Analytics

Operating an effective SOC requires overcoming a wide range of challenges. Often, security teams have too many disparate tools to manage, too many alerts to make sense of, and too many data sources that prevent the team from achieving full visibility. All these hurdles can make it difficult for your SOC analysts to identify and quickly respond to suspicious behavior and indicators of compromise.

Five Pillars of a Powerful Security Awareness Program

It seems that we might be getting to the tipping point in the corporate world where most organizations and businesses recognize they’re exposed to an increasing amount of cybersecurity risk. And with bad guys devoting a large portion of their strategy to targeting employees, the need for effectively training employees is intensifying. But before you begin to evaluate or build a program you need to first define and cement what it is you are looking to accomplish with your program.
Sponsored Post

How to Automate the Handling of Suspicious User Behavior

We live in a technological society, and cyber attacks are on the rise. Much of this fraudulent activity is linked to malicious actors or gangs of cyber criminals who are trying to exploit anything they can get their hands on. By using tools like Cobalt Strike or customized alternatives, they attempt to penetrate an organization's defenses in order to gain leverage, exfiltrate PIIs, plant ransomware or CnC beacons, or perform other kinds of malicious acts.

7 Tips To Boost Performance of Your Splunk Enterprise Security Operations

Tune in to this Tech Talk to learn how to optimize CPU and Memory usage to achieve considerable costs savings, how the built-in monitoring console and Enterprise Security auditing page can provide better visibility into how your SIEM is performing, and how to empower your team with bottleneck root cause analysis and performance tuning skills to scale your ES operations.

Converging Platforms: How Do XDR, SIEM, and SOAR Compare?

Security information and event management (SIEM), security orchestration, automation, and response (SOAR), and the newer extended detection and response (XDR) solutions have become the top choices for organizations wanting a unified view of activity within their IT environments. By combining relevant data into single consoles, XDR, SIEM and SOAR technologies minimize the time analysts spend moving between platforms and make it easier to correlate the data and develop subsequent steps appropriately.

Security Operations for Financial Institutions

Financial institutions, particularly regional banks and credit unions, are facing challenges both in terms of safeguarding data of their customers and meeting data security compliance standards. Information technology (IT) teams in these institutions are stretched thin. They struggle with needing to meet compliance obligations while simultaneously combatting cyberthreats.