โŒ

Reading view

There are new articles available, click to refresh the page.

Security Incidents Have Moved Beyond the Endpoint โ€” Shouldnโ€™t You?

Type: Blogs

Security Incidents Have Moved Beyond the Endpoint โ€” Shouldnโ€™t You?

The attack surface is expanding, and endpoint detection and response security alone is no longer enough for today's threats.


Endpoint detection and response security is no longer keeping up with cyber threats. Hereโ€™s why itโ€™s time to modernize your cybersecurity.

Abraham's Ax Likely Linked to Moses Staff

Type: Blogs

Abraham's Ax Likely Linked to Moses Staff

Both personas are likely operated by the Iranian COBALT SAPLING threat group.


Learn how CTU researchers observed similarities between the Moses Staff hacktivist group personal and the Abraham's Ax personal, suggesting they are likely operated by the same entity.

Three Reasons an Open XDR Platform is the Best XDR

Three Reasons an Open XDR Platform is the Best XDR

Open XDR is designed to help SecOps teams become more efficient, with lower investment and better visibility.


Open XDR is designed to help SecOps teams become more efficient, with lower investment and better visibility.

Cybersecurity On a Budget: Whatโ€™s Your Plan?

Cybersecurity On a Budget: Whatโ€™s Your Plan?

What cybersecurity budget you can afford to slash โ€” and when itโ€™s better to stretch


What cybersecurity budget you can afford to slash โ€” and when itโ€™s better to stretch

Visualizing the Threat through Tactic Graphsโ„ข

Visualizing the Threat through Tactic Graphsโ„ข

A new way to simplify how you use and analyze telemetry and alerts in Secureworksยฎ Taegisโ„ข.


Tactic Graphs, part of Secureworksยฎ Taegisโ„ข XDRโ€™s detection portfolio โ€” can help you keep your organization safer and reduce staff burnout.

Drokbk Malware Uses GitHub as Dead Drop Resolver

Type: Blogs

Drokbk Malware Uses GitHub as Dead Drop Resolver

A subgroup of the Iranian COBALT MIRAGE threat group leverages Drokbk for persistence.


A subgroup of the Iranian COBALT MIRAGE threat group leverages Drokbk for persistence.

The Right Endpoint Detection and Response Solutions for a Post-Perimeter World

The Right Endpoint Detection and Response Solutions for a Post-Perimeter World

The endpoint isnโ€™t the end anymore. Itโ€™s time to rethink how youโ€™re defending it.


Endpoint detection and response solutions โ€“ and the environments in which they perform โ€“ have changed dramatically. The truth is this: You have no perimeter.

Understanding the Difference Between SOAR vs SIEM vs XDR

Understanding the Difference Between SOAR vs SIEM vs XDR

In the search for the right solution to support, extend, and empower your SOC, hereโ€™s what to know when evaluating XDR vs SOAR.


There are many threat detection and response tools to choose from. Secureworks explains the differences and capabilities between SIEM, SOAR, and XDR.

Get to the Point With Good Cybersecurity Reporting

Get to the Point With Good Cybersecurity Reporting

5 Must-Haves for Robust Reporting That Paints a Clear Picture


Cybersecurity reporting is essential for executive leadership to understand the importance of cybersecurity funding, make informed decisions, and ultimately reduce risk.

Cybersecurity Leader Sunil Saale is a Taegis Titan

Cybersecurity Leader Sunil Saale is a Taegis Titan

Secureworks keeps MinterEllison secure and nimble as they move rapidly to keep up with disruption and innovation in the legal sector.


Asia Pacificโ€™s largest law firm relies on its partnership with Secureworks for 24/7 monitoring of their threat environment

Itโ€™s Time to Take a Pulse on Your Cybersecurity

Itโ€™s Time to Take a Pulse on Your Cybersecurity

Why cybersecurity in healthcare is an important indicator of your organizational health.


Cyber hygiene in healthcare organizations is equivalent to hand washing for healthcare workers.

Offensive Security Testing: A Strength Training Routine

Offensive Security Testing: A Strength Training Routine

Improving security maturity with offensive testing is a workout โ€” so thoughtful structure is needed to prevent injury and maintain progress.


Improving security maturity with offensive testing is a workout โ€” so thoughtful structure is needed to prevent injury and maintain progress

A Winning Combination: Hardening, Early Threat Detection, and Rapid Response

A Winning Combination: Hardening, Early Threat Detection, and Rapid Response

How proactively hardening Active Directory and investing in the Taegis ManagedXDR service quickly contained a breach.


A story from the Secureworksยฎ incident response (IR) trenches reveals how much work went into ensuring that "nothing bad happened" after a customer missed a patch on a web server.

What to Do When IT Outpaces Your SOC Team

What to Do When IT Outpaces Your SOC Team

Over half of SOC teams say security operations are getting more difficult to manage โ€” here are three ways to help.


Over half of SOC teams say security operations are getting more difficult to manage โ€” here are three ways to help

2022 State of the Threat: A Year in Review

2022 State of the Threat: A Year in Review

Ransomware, loaders, stealers, zero-day exploits, cyberwarfare, espionage: the cyber threats kept coming in 2022 โ€“ and threat actors are growing in skill and stealth.


Ransomware, loaders, stealers, zero-day exploits, cyberwarfare, espionage: the cyber threats kept coming in 2022 โ€“ and threat actors are growing in skill and stealth.
โŒ