Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Carbon Black Proposes Updated Cybersecurity Kill Chain Model to Help Defenders Stay Ahead of Modern Attacks

New “Cognitive Attack Loop” Helps Defenders Better Understand Modern Cybercriminal Cognitions via an Attack Cycle Comprising Three Distinct Phases

Carbon Black , a leader in cloud-native endpoint protection released a ground-breaking white paper that proposes an updated cybersecurity kill chain model to help defenders stay ahead of evolving cyberattacks.

The paper, “Cognitions of a Cybercriminal: Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behavior,” delves into the various ways cybercriminals have evolved in recent years and offers specific guidelines for CISOs and security professionals to help manage risk.

“We believe cybersecurity professionals should be looking at existing kill chain models with a new lens,” said Tom Kellermann, Carbon Black’s Chief Cybersecurity Officer and the paper’s primary author.  “It’s no longer helpful to approach cybersecurity linearly. Cognitions and context are critical and help reveal attackers’ intent. Understanding the root cause of attacks and the way attackers think is paramount to good cybersecurity. With the ‘Cognitive Attack Loop,’ we’re offering defenders an updated model of how attackers think and behave.”

Read More: Quadruple Success for UiPath as It Scoops Four Prestigious Awards in Four Weeks

Related Posts
1 of 40,616

The paper outlines, in detail, the three phases proposed in the Cognitive Attack Loop Recon & Infiltrate; Maintain & Manipulate; and Execute & Exfiltrate.

The Cognitive Attack Loop was borne from insight provided by Carbon Black’s cloud-native endpoint protection platform (EPP), which collects terabytes of data per day from around the globe, as well as insights from the Carbon Black Threat Analysis Unit (TAU).

Read More: Google’s Cloud AI Partners and How They Solve Big Problems

“The more insight defenders have into cybercriminal behavior, the more effective technology can be in recognizing and stopping suspicious activity,” Kellermann said. “The patterns we see in attack data transcend any individual attack and allow us to provide protection against a broad set of threats without relying on specific pre-discovered indicators of compromise (IOCs). With the Cognitive Attack Loop, we’ve taken the various insights from our cloud-native EPP and our threat research efforts to arrive at a modern cycle that helps uncover cybercriminal behavior and gives defenders a true sense of how modern attackers are operating.”

Read More: AI Technology RADAR: Shaking the IT Foundations with AIOps- Part 1

6 Comments
  1. Beyaz Renk,Tam kalıplı ürün,Değişim ve kalite Garantisi,Mağaza Güvencesi,3D iş Bankası güvencesi
    Farklı Renk Seçenekleri; Tam kalıplı üst kalite ürün, Değişim ve kalite Garantisi, “Elagance DUNG OFF W.

    Kırmızı” için yorum yapan ilk.

  2. Şişko kadın sikme videosu unlulerın pornno goruntulerı lezbiyen siyah çorap trvesti porno videoları ğerdek gecesi kızlık bozma canlı Türk göt sikme porno
    video. 2 gün önce 3 izlenme. Zenci turk karisi. 2 gün önce 3 izlenme.
    lezbiyenler video s**. 4 sene önce 15 izlenme. Bir cevap yazın Cevabı iptal etmek için tıklayın.

  3. Insulin for sale online says

    Buy Metformin online without prescription Metformin for sale without a prescription
    Glipizide for sale, no prescription needed Affordable Glyburide for
    diabetes without prescription

  4. This is a good tip especially to those fresh to the blogosphere.
    Brief but very accurate info… Thanks for sharing this one.
    A must read article!

  5. Copper scrap inventory tracking Copper scrap sourcing network Metal residue reclamation
    Copper cable recycling machinery, Scrap metal repurposing center, Scrap Copper refining methods

  6. Русское Порно 365 says

    My website: russkoeporno365

Leave A Reply

Your email address will not be published.