Sunday, April 18, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Privacy

Download the Essential Guide to Response Automation

December 16, 2020
in Internet Privacy
Download the Essential Guide to Response Automation
587
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

In the classic children’s movie ‘The Princess Bride,’ one of the characters utters the phrase, “You keep using that word. I do not think it means what you think it means.”

It’s freely used as a response to someone’s misuse or misunderstanding of a word or phrase.

You might also like

What are the different roles within cybersecurity?

SysAdmin of Billion-Dollar Hacking Group Gets 10-Year Sentence

Severe Bugs Reported in EtherNet/IP Stack for Industrial Systems

http://thehackernews.com/

“Response Automation” is another one of those phrases that have different meanings to different people. It’s bantered around by the security vendor community so much that its precise meaning, when used, is unclear.

Many vendors throw the term out without explaining exactly what they mean by the phrase. One vendor’s response automation might, and often do, perform very differently from another vendor’s response automation capabilities. But, hey, they have “response automation!”

A recently published guide is meant to make sense of Response Automation (Download here). It discusses the evolution of response automation and distinguishes five increasingly capable levels of response automation available today. The guide will help you understand exactly what is meant when someone offers response automation, as well as the questions to ask to help clear up any confusion.

http://thehackernews.com/
The five progressive levels of response automation

The guide also shares the types of security solutions that provide the varying levels of response automation, including Next-Generation Antivirus (NGAV), Endpoint Detection and Response (EDR), Extended Detection and Response (EDR) and Security Orchestration, Automation and Response (SOAR).

The capabilities of each solution category are quite different, which directly impacts each’s the ability to provide sophisticated response automation features.

The Five Levels of Response Automation

As depicted in the chart above, Cynet frames the five increasingly capable levels of response automation, along with the specific benefits provided by each. The most basic type of response automation involves remediating a specific threat in response to an alert on an endpoint. This, Cynet says, is table stakes for any threat detection and response (TDR) solution.

The ultimate level of response automation involves moving beyond remediation actions to include fully automated investigatory steps to determine if a detected threat actually part of a larger attack and, if so, uncovering related attack components. When a threat is detected, the automated investigation uncovers the root cause of the threat – how did the threat come to be in the environment.

As components of an attack are uncovered, an automated investigation can search the environment to expose the full scope of the attack. And, of course, appropriate remediation actions are taken at every step to eradicate all attack components.

The Real Meaning of Response Automation

The security community is very aware of the talent shortage and the ongoing pressures of “alert overload.” It only makes sense that the more we can take off the plate of security professionals, the better things would be. Better in what way?

First, automating repetitive and more pedestrian tasks would free up significant time for security staff to focus on more important items. And maybe reducing the time required to chase alerts precludes the need for additional staff.

Second, speeding up threat response to machine time reduces the likelihood that the threat may proliferate or cause immediate damage. Response automation at a minimum provides a healthy head start for security analysts in their threat response workflow.

For those of you that would welcome a tool to help improve security while reducing manual effort – let’s turn to another famous quote from The Princess Bride – “As you wish.”

Download the essential guide for Response Automation here


Credit: The Hacker News By: noreply@blogger.com (The Hacker News)

Previous Post

ZebiAI Announces Appointment of Rafa Gomez-Bombarelli as Chief Learning Officer - Yahoo Finance

Next Post

Programming language security: These are the worst bugs for each top language

Related Posts

What are the different roles within cybersecurity?
Internet Privacy

What are the different roles within cybersecurity?

April 18, 2021
SysAdmin of Billion-Dollar Hacking Group Gets 10-Year Sentence
Internet Privacy

SysAdmin of Billion-Dollar Hacking Group Gets 10-Year Sentence

April 17, 2021
22-Year-Old Charged With Hacking Water System and Endangering Lives
Internet Privacy

Severe Bugs Reported in EtherNet/IP Stack for Industrial Systems

April 16, 2021
YIKES! Hackers flood the web with 100,000 pages offering malicious PDFs
Internet Privacy

YIKES! Hackers flood the web with 100,000 pages offering malicious PDFs

April 16, 2021
US Sanctions Russia and Expels 10 Diplomats Over SolarWinds Cyberattack
Internet Privacy

US Sanctions Russia and Expels 10 Diplomats Over SolarWinds Cyberattack

April 16, 2021
Next Post
Programming language security: These are the worst bugs for each top language

Programming language security: These are the worst bugs for each top language

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

What are the different roles within cybersecurity?
Internet Privacy

What are the different roles within cybersecurity?

April 18, 2021
Machine Learning Technology May Help Decipher Biological Language of Cancer, Parkinson Disease
Machine Learning

Machine Learning Technology May Help Decipher Biological Language of Cancer, Parkinson Disease

April 17, 2021
SysAdmin of Billion-Dollar Hacking Group Gets 10-Year Sentence
Internet Privacy

SysAdmin of Billion-Dollar Hacking Group Gets 10-Year Sentence

April 17, 2021
10 Popular Must-Read Free eBooks on Machine Learning
Machine Learning

10 Popular Must-Read Free eBooks on Machine Learning

April 17, 2021
Security crucial as 5G connects more industries, devices
Internet Security

Security crucial as 5G connects more industries, devices

April 17, 2021
Relay Therapeutics pays $85M for startup with a new AI tech for drug discovery
Machine Learning

Relay Therapeutics pays $85M for startup with a new AI tech for drug discovery

April 17, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • What are the different roles within cybersecurity? April 18, 2021
  • Machine Learning Technology May Help Decipher Biological Language of Cancer, Parkinson Disease April 17, 2021
  • SysAdmin of Billion-Dollar Hacking Group Gets 10-Year Sentence April 17, 2021
  • 10 Popular Must-Read Free eBooks on Machine Learning April 17, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates