advanced-menu-icon

Cybersecurity in ATM: Investigations Using Firewall Logs

This article sheds light on Firewall Logs in incident investigations. We explore key behaviors and patterns for effective threat detection

Read the blog

Cybersecurity in ATM: Investigating Cyber Incidents Using the 2FA Logs

Background

Historically, security teams would advocate for their IT teams and management to approve the implementation of multi-factor authentication in order to reduce the impact of threats such as brute force attacks against passwords, mitigate fall out from phishing emails and other social engineering related attacks. For context, there are multiple methods of implementing two factor authentication, which includes but is not limited to, SMS based, voice and app based. Once an implementation is in place, this will provide security and incident response teams additional protection and more importantly, additional data points to investigate security alerts.

Read the blog

Cybersecurity in ATM: Investigations Incidents with Cloud Access Security Broker (CASB) Data

CASB solutions can help your business in addressing risk in cloud-based services, consistently enforce security policies and comply with regulations, even when these services reside beyond your perimeter and out of your direct control. The value stems from the ability to identify high-risk applications, users, and other key risk factors across cloud platforms - a potential blind spot for many businesses.

Read the blog

Cybersecurity in ATM : Endpoint Detection and Response (EDR) logs

Endpoint detection and response (EDR) provides continuous monitoring and analysis of endpoints, aiding incident response teams in efficiently managing threats and reducing overall response times in cybersecurity operations.

Read the blog

Cybersecurity in ATM : Using the Security Stack for Investigations – Password Reset Logs

This article explores cyber investigations through leveraging the Security Stack. It sheds light on the role of password reset logs in swift breach detection and mitigation.

Read the blog

Cybersecurity in ATM: Leveraging Anti-Virus Logs for Incident Response

As part of our series on how incident response teams leverage different parts of the security stack for investigations, we now are going to look at how anti-virus logs are used and can be used.

Read the blog

Cybersecurity in ATM : Incident Response using the Security Stack – Office 365 Logs

As part of our ongoing series regarding how each part of an organization’s security stack helps the incident response and forensic teams perform their analysis, we are going to now discuss Office 365 logs and the details it captures as teams interact with services held there. 

Read the blog

Cybersecurity in ATM : Taking Apart the Security Stack in Incident Response (Part 2) - Investigations Using Proxy Logs

This article explores incident response investigations using proxy logs to uncover security gaps in email filtering.

Read the blog

Cybersecurity in ATM : Taking Apart the Security Stack in Incident Response (Part 1) - Email investigations

Malicious actors regardless of motivation, whether financial or hacktivism, tend to look for the path of least resistance. In many data breaches, when forensic teams investigate the root cause, they end up tracing it back to email as the initial vector of the breach, where it all began. The reason this turns out to be the most lucrative for all attackers is the fundamentals of human psychology.

Read the blog