Remove products threat-hunting
article thumbnail

Threat Hunting to Find the Good Stuff

Palo Alto Networks

In the final episode of Season One of “This is How We Do It,” Peter Havens from Cortex product marketing sits down with Leeroy Perera, staff security engineer. They discuss the practice of threat hunting and how we apply it in our SOC. To combat this threat, Leeroy emphasizes the significance of threat hunting.

Network 78
article thumbnail

Utilizing AI to defend the Black Hat NOC

CIO

This year’s Black Hat USA conference saw more than 907M threat events detected in real time, according to data collected by Palo Alto Networks. This is a staggering number that shows just how attractive the event is to threat actors – and artificial intelligence (AI) was a key driver in protecting against these attempts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity teams, beware: The defender’s dilemma is a lie

TechCrunch

You may waste money on products, services or capabilities you don’t truly need or underinvest in the ones you do. The Pyramid of Pain shows that by consistently detecting and responding to threat actor activity quickly enough to stop attacks in their tracks, you can impose cost on that actor, turning defense into offense.

article thumbnail

Stairwell secures $20M Series A to help organizations outsmart attackers

TechCrunch

As well as raising $20 million, an investment round co-led by Sequoia Capital and Accel , Stairwell is launching Inception, a threat-hunting platform that aims to help organizations determine if they were compromised now or in the past. I just wish we had a product to market when SolarWinds happened,” Wiacek added.

article thumbnail

This Is How We Do It — Season One Recap

Palo Alto Networks

Every alert that enters the SOC undergoes some level of automation, with a goal to automate as many as possible, allowing the team to focus on proactive threat hunting. By deploying lightweight models at the edge, swift identification and blocking of malicious activities without the need for extensive file analysis is ensured.

article thumbnail

Witnessing a Revolution in Cybersecurity with AI

Palo Alto Networks

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more.

article thumbnail

Security automation startup Veriti launches out of stealth with $18.5M

TechCrunch

According to CEO Adi Ikan, the newly announced capital is being put toward scaling Veriti’s business operations and developing its product suite. Hunters , another competitor, aims to automate the threat-hunting process by taking in data from networking and security tools to detect stealth attacks. billion in 2020.