Skip to main content
Meet NetWitness at RSA Conference 2024!
Stop by our booth #254 or book a meeting with an expert. Reserve Your Spot Today!
BLOG

Securing the Digital World

Unveiling the Future of Network Security: SASE vs SSE

Since cybersecurity is an ever-evolving field, staying abreast of cutting-edge technologies and frameworks is necessary for organizations aiming to strengthen their defenses against an array of threats. Two prominent paradigms that have emerged as game-changers in the realm of network security are Secure Access Service Edge (SASE) and Secure Service Edge (SSE). In this comprehensive exploration, we will take a look into the intricacies of these concepts, discerning their differences, and shedding light on how they shape the world of network security and performance. Then we will explore the implementation of SASE and SSE with NetWitness, exploring best practices, challenges, and the numerous benefits these approaches bring to the table. […]

Read more

Unveiling the Power of Cloud Analytics with NetWitness

Within the realm of data management and cybersecurity, the integration of cloud analytics has become a transformative force for organizations looking to maximize the potential of their digital infrastructure. This era is marked by the rise of cloud analytics as a catalyst, empowering organizations to gain actionable insights from vast datasets. NetWitness, a standout player in this domain, transcends conventional analytics by providing unparalleled visibility, efficient incident response, and advanced threat detection in the dynamic realm of cloud computing. As organizations increasingly shift their data repositories to the cloud, the need for sophisticated analytics tools has never been more pronounced, making NetWitness an indispensable ally in navigating the complexities of […]

Read more

NetWitness, a NOC Partner at Black Hat USA 2023

Behind the scenes at Black Hat USA 2023, Network Operations Center (NOC) partners watch and wait, scanning the event’s network for suspicious activity. But with over 20,000 cyber enthusiasts and professionals in attendance, protecting the network is no easy task. Every year, the NOC partners are selected by Black Hat to provide a high security, high availability network to users and protect that network from potential attacks. This year’s partners delivering from Las Vegas included Arista, Cisco, Corelight, Lumen, NetWitness, and Palo Alto Networks. Collaboration and integration were key to success in this dynamic environment, with leaders joining forces to share API (Automated Programming Interface) keys, documentation, and the unified […]

Read more

The Importance of Log Management in Cybersecurity: A Comprehensive Guide

In today’s digital age, where data breaches and cyberattacks are on the rise, reliable cybersecurity is more important than ever. Among the many tools and techniques available to safeguard your organization’s digital assets, log management stands out as a cornerstone of effective cybersecurity.  In this comprehensive guide, we will explore the significance of log management in cybersecurity and its pivotal role in detecting and mitigating threats. The Significance of Log Management Log management is a fundamental aspect of cybersecurity and IT operations. It encompasses a series of crucial processes aimed at collecting, storing, analyzing, and monitoring log data generated by various systems, applications, and devices within an organization’s IT infrastructure. […]

Read more

GigaOm’s Radar Report Features NetWitness NDR and SIEM Solutions

A closer look at the features and strengths of our market-leading cybersecurity products.  Keeping pace with leading cybersecurity solutions and industry evaluations is essential—but it isn’t always easy. Fortunately, resources like the GigaOm Radar Report, which analyzes top-performing tools, can serve as an authoritative guide for IT professionals and decision-makers.  This year’s Radar Report includes NetWitness, spotlighting both our Network Detection and Response (NDR) and Security Information and Event Management (SIEM) products. Among vendors who offer both of these critical security technologies, these integrated and powerful offerings from NetWitness hold the strongest positions in the reports. Here, we’ll provide an overview of each product’s key attributes as outlined in GigaOm’s […]

Read more

Understanding Secure Access Service Edge (SASE)

Secure access service edge (SASE – pronounced “sassy”) is a modern architectural framework that combines network security and wide area networking (WAN) capabilities into a unified cloud-based service. It is designed to provide secure and optimized access to network resources for users, regardless of their location or the devices they use. Secure access service edge represents a shift from the traditional approach of backhauling network traffic to centralized data centers for security inspection. Instead, it adopts a cloud-native model where security services are delivered from the cloud and applied directly at the network edge, close to the user and the resources they are accessing. Acronyms to Know Before we get […]

Read more

Network Detection and Response: Strengthen Your Cybersecurity With NetWitness

Millions of cybersecurity events occur every day, and as time and technology continue to progress, the means of these cyber attacks become more sophisticated and immensely more difficult to detect. Statistically speaking, if you are a business owner who stores and manages sensitive data, it is not a matter of if but when someone will attempt to access your networks and compromise your data. In fact, it’s highly likely that you have already been the target of a malicious attack, whether successful or unsuccessful, and you may not even be aware of it. In today’s article, we will be discussing network detection and response: what it is, how it works, […]

Read more

Securing Secrets: Insights into Code Obfuscation Techniques

Once a threat actor gains access to a network or tricks a user into downloading a malicious attachment. The next step is to download their payload, this could be a toolset or malware. Code obfuscation has become an important step for threat actors to accomplish this task.  Whether it is a webshell, or a utility program code obfuscation is often utilized during part of the command execution phase.  In this post we are going to review a recently observed phishing attack where the threat actor delivered the remote access tool known as “asyncrat”   through several different variations of code obfuscation.  As we have all seen many many times the […]

Read more

How NetWitness Orchestrator Can Make Your SecOps More Efficient

Security operations (SecOps) teams are battling a complex and ever-evolving challenge: Keeping an organization secure against cyberattacks from faceless, remote users in a technologically advanced world. With the rise of threats, new technologies, and increasingly sophisticated scams, staying ahead of the bad guys is more important than ever. That’s where security orchestration, automation, and response (SOAR) comes in to make your SecOps team more effective against attacks. A SOAR system automates what would be a manual process of identifying cyberattacks and making it easier to respond to those attacks. However, not all SOAR systems are created equal. NetWitness Orchestrator, a SOAR solution from NetWitness, is an invaluable tool for SecOps […]

Read more

NetWitness is proud to join Black Hat Asia 2023 in the NOC

This week, NetWitness proudly joins BlackHat in the Network Operations Center (NOC) at the BlackHat ASIA event, continuing our long-standing collaboration. As always, we’re here to provide top-notch SIEM, NDR, and SOAR services, standing shoulder to shoulder with our seasoned global threat-hunting team, which comprises Sales Engineering and Incident Response. 

Read more

Cloud SIEM: A Thorough Breakdown

If your business uses cloud technology for day-to-day operations — or is looking to start — our NetWitness Cloud SIEM will ensure that you can operate safely and securely!
Read more
people typing on laptops with cybersecurity locks and tech accents

USMS and Broader Implications for Law Enforcement as Ransomware Targets

  The mission of the U.S. Marshals Service (USMS) is “to enforce federal laws and provide support to virtually all elements of the federal justice system” through multiple disciplines. Its law enforcement (LE) focus, reach and scope make this week’s report of a recent cyberattack involving both ransomware and data exfiltration especially concerning. While this news is fresh, and the incident ongoing, it’s a good time for us all to reflect on why LE entities can be especially attractive targets to bad actors. As with all important things in life, it always pays off to understand motivations and incentives, and how they can drive behaviors and actions. Low-hanging fruit of […]
Read more

Five Thoughts on Take Down of Hive

  The takedown of the Hive ransomware-as-a-service group has been in the news over the past week, and it’s good news indeed. Beyond the obvious benefits of disrupting this criminal enterprise, there are some other discrete takeaways which are particularly important to note. Cross-jurisdictional cooperation and coordination can be done, and done effectively. Any of us who have served on committees know about Parkinson’s Law, which correlates a group’s size to the amount of time needed to accomplish its goals: the bigger the group, the longer the time taken, even without a change in scope. The fact that this global law enforcement effort was a success is even more impressive […]
Read more

Make it Costly: How to Deter Threat Actors by Escalating Their Costs

Introduction Many years ago, I spoke at a @suitsandspooks panel in Washington, D.C. with some of the cybersecurity industry’s best and brightest minds. One of the topics addressed was the concept of active defense strategy in the commercial (private sector) world versus the public world. In those days the idea of ‘hacking back’ against a hostile, adversarial threat actor or group was discussed frequently, with some organizations and their leaders taking a more vocal stance (in both public and private sectors). The panel was fantastic: Dmitri Alperovitch (CrowdStrike), Greg Hoglund, Jeff Carr, me, and moderated by Anup Ghosh. A smart group of guys all with strong opinions on the subject […]
Read more

UPDATE: What We Know About the Russia/Ukraine Conflict and How You Should Prepare Your Cybersecurity Capabilities

UPDATED March 25, 2022: The Biden Administration released a statement on March 21 urging companies to strengthen their cybersecurity capabilities and protections in the face of potentially damaging cyber activity perpetrated by threat actors as part of the ongoing conflict. The Administration also urged organizations to execute a number of best practices for bolstering cyber defense capabilities. Additionally, the Cybersecurity & Infrastructure Security Agency (CISA) website’s Shields Up page is an excellent resource to help prepare for disruptive cyber incidents. The NetWitness Incident Response team is available to assist organizations with enacting these recommendations, as well as several other services, and does not require organizations to be existing NetWitness customers […]
Read more

The Apache Log4j Zero-Day Vulnerability: What You Need to Know

When the Log4j vulnerability was revealed, the NetWitness team launched an immediate investigation into Log4j use within the NetWitness Platform, as well as actions to support its customers in identifying and remediating attempts to exploit the vulnerability in their own environments.
Read more

Could Your Collaboration Tools be Hacker-Friendly?

It’s back to the future. Companies and their employees are slowly returning to in-person work, with many organizations maintaining their hybrid workforce model. And this shift to remote work has resulted in an increasing reliance on web-based collaborative tools. In fact, a Gartner study found that usage of collaboration tools has nearly doubled over the last two years, going from 55% to 80% among workers. Many of these tools, such as Microsoft Teams, Slack, and Zoom, have been integral components of organizational productivity for years, but the change to a highly remote workforce has more deeply embedded these types of applications into business operating procedures. Realizing this opportunity, hackers and […]
Read more
XDR threat detection and response

NetWitness: XDR, Visibility, and the Future of SOCs

This overview introduces a downloadable XDR whitepaper by Frost & Sullivan, covering XDR and enhanced visibility, the value of XDR to the future of security ops, and why organizations should adopt XDR by focusing on 3 essential keys.
Read more
ransomware FAQ

Ransomware: A Beginner’s Guide to Threat Detection

At NetWitness we know how devastating it can be to find your organization impacted by a ransomware attack, so we created this Ransomware FAQ. This intro to ransomware explains essential ransomware concepts to equip IT and non-IT professionals with deeper knowledge of this growing threat.
Read more
blog post

XDR and Zero Trust: Partners in Threat Detection

Zero Trust isn’t always part of the XDR conversation—but it should be. Here’s why the relationship of these threat detection partners is so critically important to an enterprise’s digital transformation security.
Read more
blog post

A Peek Inside the Black Hat NOC with Grifter

In this interview, Neil Wyler, a.k.a. Grifter, talks about how he got involved with Black Hat more than 20 years ago, and how the event’s network operations center (NOC) has evolved in that time to take on today’s modern cybersecurity challenges.
Read more

Verifiable Credentials: The Key to Trust on the Next Web

RSA once again secures the open web In 1994 the World Wide Web was at a crossroads. The technology that today we simply call “the web,” invented five years earlier by Tim Berners-Lee, was poised to become the de facto interface to the internet. Its document-based, human-centric, point-and-click model was wildly popular among the technologists of the day, and was beginning to see rapid uptake among the broader population of desktop software users. But something was missing: trust. Because the web was inherently open, any use case requiring trust between parties was impossible. All web traffic at that point traveled in clear text where it could be intercepted, and potentially […]
Read more
blog post

Your Threat Intelligence Platform is Ready to SOAR

When security is weaved in from the outset, the fabric you produce at the end of the project is stronger and safer. In the security orchestration, automation and response (SOAR) space, that essential ingredient is a threat intelligence platform (TIP) capability.
Read more
Visualization of IoT Edge

Securing the IoT Edge Ecosystem

IoT Edge architecture is emerging to tackle the explosion of Internet of Things (IoT) devices and systems. This open ecosystem approach enables contributions from many sources. RSA is doing its part to add security across the range of IoT Edge solutions.
Read more
Drawing of a face profile over lines of code

Strategies for Insider Threat Mitigation

In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for addressing this evolving threat.
Read more
Man ponders what is on his computer screen

Reimagining the SOC for the Future of Work

Amy Blackshaw and Michael Adler talk with ITPSmagazine about ways to enable a successful virtual SOC and what organizations need to do to manage the growing threat of dynamic workforce risks.
Read more
Security Considerations

Security Considerations for the Dynamic Workforce

The way we work has changed forever. From offices to homes and remote locations, what do security operations need to consider? And how do they need to adapt to this dynamic workforce? There are five security considerations that should be top of mind in this new reality.
Read more
Operationalizing Incident Response

Operationalizing Incident Response

Risk management, threat intelligence, and incident response come together in a sensible, practical, and operational detect and respond model to positively impact your cyber risk strategy. Staffing models (small and large), tools, and managed service providers can also be leveraged successfully.
Read more