news
Forrester names
BlackBerry Cylance
consulting a strong
IR performer
lackBerry Cylance, a business
unit of BlackBerry Limited,
has announced that Forrester
Research has selected the company as a
strong performer in the recent Forrester
Wave report covering cybersecurity
incident response (IR) services. The
global report highlights the BlackBerry
Cylance consulting team’s well-defined
processes to ensure effective incident
response. The Forrester Wave report
is an in-depth assessment of 15 of the
most significant cybersecurity IR services
vendors across 11 criteria. BlackBerry
Cylance Consulting achieved the highest
possible score for incident response,
supporting products and services,
average hours per response and
industrial control systems (ICS).
B
“We’re so pleased to see Forrester
reinforce the effectiveness of our proven
AI incident response methodology
based on containment, remediation and
prevention,” said Corey White, Chief
Customer Officer at BlackBerry Cylance
Consulting. “Our expert consultants work
quickly to not only resolve incidents and
restore operations, but also to leverage
BlackBerry Cylance’s first-of-its-kind
Artificial Intelligence to get ahead of
the kill chain and prevent incidents
before they happen. Our ability to
rapidly quarantine known and unknown
malware, deploy sophisticated detection
rules and support AI-driven automated
response, gives customers the predictive
advantage they need before any data,
systems or reputations are damaged.”
12
KASPERSKY LAB ANNOUNCES
ENHANCEMENTS TO APT
INTELLIGENCE REPORTS
aspersky Lab has enhanced
its APT Intelligence Reports
with contextual information
related to advanced persistent threat
(APT) actors.
K
The company has also added
mapping to the MITRE ATT&CK
threat model for previously
discovered attacks. These
improvements help security
operations teams subscribed to the
APT Intelligence Reporting service
better understand adversaries’
goals, techniques and capabilities.
This allows them to connect
incidents with a threat actor to
improve their understanding of
the motivation behind a specific
attack. Teams will also be able to
predict the attacker’s next steps,
to better protect themselves from
future incidents.
The APT reports from Kaspersky
Lab now provide an overview of each
APT group, including country of origin,
aliases, list of previous targets and
victims, as well as the typical tools
and descriptions of past campaigns.
The reports also include links to
additional resources, specific
Indicators of Compromise (IoC) and
YARA rules, to help organisations
detect these attacks.
Previously discovered APT campaigns
are mapped to MITRE ATT&CK, a
globally-accessible knowledge base of
adversary tactics and techniques based
on real-world observations.
Experts break down the attacks
into several phases in accordance
with the PRE-ATT&CK and ATT&CK
Enterprise matrixes, showing which
tactics and techniques were leveraged
at every stage.
Issue 13
|
www.intelligentciso.com