search external-link twitter facebook feed google-plus linkedin angle-left angle-right angle-up angle-down youtube-play
The Hexadite Blog
Expert advice and round-the-web cyber security news to help secure your company. Get the latest industry insights delivered to your inbox.

Sign up and stay up-to-date.

Home>The Hexadite Blog

This Week in Cyber Security News: February 1, 2016

The first in a weekly roundup, highlighting cyber security news and opinion.  Cyber Security Spending Bank of America’s Unlimited Cybersecurity Budget Sums Up Spending Plans In A War Against Hackers By Steve Morgan In a live interview from Davos Switzerland on Bloomberg roughly one year ago, Bank of America Corp. CEO Brian Moynihan said the […]

Blog /

4 Things We Can Learn About Cyber Security from Aaron Lufkin Dennison, 1850s Watchmaker

In an episode of the PBS series “How We Got to Now” (and the book of the same name) author and historian of innovation Steven Johnson connects the dots between Galileo and how our measurement of time enables things like GPS. In doing so, he profiles Aaron Lufkin Dennison, watchmaking innovator, and someone we can […]

Blog /

Overwhelmed by Alerts: How to Keep Up with the Exponential Increase in Cyber Incidents

In the past day, two articles have highlighted the biggest problem faced by incident response teams: the rapid increase in cyber attacks are resulting in thousands of security alerts, overwhelming those that have to investigate and remediate. In “Cutting Through the Noise: How to Manage a Large Volume of Cyber Alerts,” Bill Sweeney offers the […]

Blog /

Automated Incident Response is the Best Weapon Against the Casual Attacker

Recently, Anton Chuvakin, Gartner Research VP, called on companies to get good at fighting basic, commodity attacks. In his blog Defeat the Casual Attacker First!!, he finds it “highly illogical and, in fact, wasteful, to attempt stopping or detecting an advanced attacker before you managed to succeed with a common one.” He has a point! […]

Blog /

“I Love Lucy” as an allegory for the weakness of human operations and the importance of automation

A good old example of why automation in important and how, in many cases, it transcends traditional human-operations and weaknesses (specifically, the common weakness to chocolate…):  

Blog /

Achieve Business Value by Automating your Cyber Incident Response Program

By Eran Barak, CEO of Hexadite In our previous blog we laid out, “10 Steps to Building an Effective Cyber Incident Response (IR) Program”. Unfortunately, too many times we encounter people who consider the IR program too overwhelming, impossible to manage on a daily basis with a limited crew and resources. That’s where Automated Incident Response […]

Blog /

10 Steps to Building an Effective Cyber Incident Response Program

By Barak Klinghofer, CPO of Hexadite Having trained CIRT teams and working as an Incident Response consultant for years, I still continue to receive phone calls, emails and 1×1 discussions regarding the Incident Response process. It only makes sense now to lay these out on paper. This program is what I see as the summary of our […]

Blog /

Incident Response is not only about Remediation

Incident Response is not only about Remediation By Barak Klinghofer, CPO of Hexadite The Oxford dictionary defines “Remedy” as “A medicine or treatment for a disease or injury”, or “A means of counteracting or eliminating something undesirable”. As it is, this definition is very relevant to cyber-security incidents and their remediation process. That said, many of the […]

Blog /

Incident Response is not Forensics

Incident Response is not Forensics By Barak Klinghofer, CPO of Hexadite Many times you hear people saying: “Wait, isn’t Incident Response just like Forensics? Both use similar methods to analyze threats or attacks and understand what to do with them”. Well, not really. Let’s understand the differences between the two, specifically in the world of […]

Blog /

Applying OODA Loop in Incident Response Programs

The world of cyber-security is in many ways similar to a battlefield – the two sides, the attacker and the defender, try to achieve their goals against their opponent in the most effective way and with as little damage to themselves as possible. So, it is only reasonable that when an organization is planning its […]