<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

 

Blog

Read or download all Datashield news, reviews, content, and more.

 

Threat Hunting within Microsoft Azure Sentinel

Find out what sets apart Microsoft's new SIEM tool (Azure Sentinel) from the rest of the solutions in the marketplace. Take a deeper look at Threat Hunting within Azure Sentinel and five features that make Sentinel an effective tool for security teams rather they use Azure or not. As far as data breaches go, 2019 is shaping up to be a landmark year based on the findings of the 2019 MidYear QuickView report published by Risk Based Security.

Is Cyber Insurance Reliable?

Is cyber insurance the silver bullet to cover your organization from an attack? What lies within the fine print of a cyber insurance policy? These questions posed along with important considerations when choosing how to implement cyber security insurance properly.

Carbon Black & Azure Sentinel for Cloud Deployed Cyber Security Resilience

In this special announcement, DATASHIELD officially outlines its new partnerships with Carbon Black and Azure Sentinel as a unique cloud deployed pairing for cyber resilience. Datashield Pairs Carbon Black & Microsoft Azure Sentinel for a Cloud Deployed Cyber Security Resilience Solution

Carbon Black: Managed Endpoint Detection & Response (EDR)

Learn how Datashield provides managed Endpoint Detection & Response (EDR) utilizing Carbon Black's Predictive Security Cloud and leveraging the primary EDR tool CB Defense. VMware Carbon Black Endpoint Detection and Response Platform: Carbon Black is a suite of cloud-based security solutions that provides a variety of endpoint focused tools. Carbon Black labels this single agent, console and platform as the CB Predictive Security Cloud. At the core of Carbon Black’s endpoint security software is CB Defense. CB Defense serves as a next-gen antivirus (NGAV) as well as an endpoint detection and response (EDR) solution. CB Defense is a powerful tool that is easy to setup at a relatively affordable price point. Core features of CB Defense include the following:

The Biggest Problem with Sales in Cyber Security

DJ Jones, Director of North American Sales at Datashield, outlines one of the biggest problems with sales in cyber security. The answer may surprise you. Today we caught DJ off guard and asked him:

  • 2 min read
  • Feb 11, 2020 1:41:37 PM

11 Reason RSA NetWitness 11.x SIEM Enhances Customer Threat Detection & Response

Datashield and RSA have a long history, dating back to 2009. RSA NetWitness continues to be a preferred SIEM solution for many of our clients. The platform is especially powerful for utilizing full packet capture, which allows our analysts to perform in-depth forensic investigations. The one downside we hear from many is that RSA NetWitness can be challenging to navigate and configure. Our long partnership gives us unparalleled service and knowledge to the clients we serve using the RSA platform. Over the past 12 months, RSA has made strides in developing the RSA NetWitness Platform into a more evolved and user-driven SIEM that provides security monitoring, detection, and investigation tools under a single unified platform. RSA has released new innovative capabilities, a redesigned user experience, and invested more in the core functionality to increase the speed of detection and response to threats.

Microsoft Releases Notice of More RDP Vulnerabilities

Two more security issues announced surrounding Remote Code Execution against Remote Desktop Services. Microsoft released a notice today concerning two vulnerabilities, which would result in a Remote Code Execution vulnerability against the Remote Desktop Services. These are being tracked under CVE-2019-1181 and CVE-2019-1182. This is akin the previous vulnerability that we notified you on, CVE-2019-0708, aka Bluekeep.

Cyber Security as a Service

Take a Journey through SIEM Selection, Management and Threat Hunting via MDR Choosing The Right SIEM Solution Security Information and Event Management (SIEM) tools are an essential part of modern network security architecture. Not only is choosing the right solution important but properly implementing and managing the tool are critical for success. Protecting your organization from attack is not as simple as installing the hardware/software and letting it run. You must be active, diligent, and agile to keep your network secure.

The Packet Advantage

Learn why packet level detail and full packet capture are critical to the forensic capabilities of a security analyst. Listed below are the top 7 reasons why packets are superior to logs alone.

Everyone Wants to Be a Penetration Tester

There is a lot more to cyber security than just hacking... So… Everyone wants to be a penetration tester! Lately I’ve been speaking at events, conducting interviews, mentoring new security professionals and students and every single person when asked how they want their career to progress or what they are interested in doing, like clockwork every single person says, “penetration tester”. Maybe I’m the only one, but this is a huge pet peeve of mine!

    Related Posts

    Lumifi Cyber Acquires Datashield to Deliver Next-Generation Managed Detection and Response

    Combines AI and Machine Learning-Based Software with MDR Services to Provide Fortune 500-Grade Security to Companies of All Sizes Palm Desert, CA and Scottsdale, AZ — May 3, 2022 — Lumifi Cyber, Inc., a next-generation managed detection and response (MDR) cybersecurity software provider, today announced its acquisition of Datashield, Inc., an end-to-end cybersecurity resilience services provider, to deliver Fortune 500-grade security to companies of all sizes for an affordable monthly price.

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    The Difference Between Cybersecurity & Network Security

    The Difference Between Cybersecurity & Network Security