Today we announce the publication of our Special Report: Reduce Risk with Real-time Interactive Remediation of Network Traffic. It contains a discussion and explanation of the emerging capabilities of technologies to enable real-time decisions based on live / streaming network traffic data to reduce cybersecurity and operational risk.
Interactive Remediation - an emerging, real-time, capability for cybersecurity and network teams
Tags: cyber security, Data-In-Motion, mantis
The next phase in continuous cyber defense and what it means
The next phase in continuous cyber defense and what it means
An interview with Kim Watson, Technical Director of the Integrated Adaptive Cyber Defense (IACD) initiative at JHU APL
Is it possible to get access to, and process all the relevant information available, to improve cyber defense? The threat landscape continues to evolve, new and ever more sophisticated TTPs (tools, techniques and procedures) are utilized by adversaries while cybersecurity teams have a new arsenal of AI/ML and orchestration tools, that may offer relief for overwhelmed security staff whose efforts are gaining increased attention by the c-suite.
Tags: mantis
Understanding the Difference Between Network Monitoring and Network Security Monitoring
As technologies advance and enterprise networks expand, administrators accountable for the overall health and performance of infrastructure accumulate more and more responsibility. CIOs are continually analyzing the problem of how to better monitor and secure the activity within their organization’s network.
Tags: Real-Time Monitoring, Data-at-Rest, Data-In-Motion, cybersecurity
5G & IoT Networks: Moving Network Monitoring and Analysis to the Edge
MantisNet's recently published whitepaper, Solutions for the Next Generation of 5G and IoT Network Deployments, focuses on the enablement of real-time network intelligence, monitoring and analysis at the edge. This topic is very timely as telecommunications carriers are readying their fifth generation, or 5G, network deployments. The promise of higher speeds, lower latency and greater throughput has arrived to deliver improved digital experiences and further enable the continual growth of Internet of Things (IoT) connectivity and interactions.
Tags: Real-Time Monitoring, mantis
We had the pleasure of supporting the Software Engineering Institute at Carnegie Mellon University’s conference, FloCon: Using Data to Defend. The presentations and discussions at the event provided validation that changes are coming to network and cyber security. More mathematical solutions are being developed to fuel machine learning and algorithms to combat malicious and other network traffic of interest. If you missed the event, an overview and video of our presentation is below.
Tags: network engineering, Real-Time Monitoring, DNS Monitoring, Data-In-Motion, mantis
The Biggest Dilemma CIOs are Facing Heading Into 2019
2019 is right around the corner, and CIOs are prepping for the new year. Specifically, CIOs are making plans as it relates to cybersecurity and data privacy management. Grappling with how to make informed business decisions with real-time technologies, increasing the use of orchestration and automation along with continuous monitoring, to enable real-time detection, decisioning and remediation.
MantisNet is a proud sponsor and participant at the upcoming FloCon 2019 conference in New Orleans, January 7-10, 2019.
We were excited to be accepted as a speaker and sponsor for the annual Software Engineering Institute at Carnegie Mellon University’s event. The theme for FloCon 2019 is ‘Using Data to Defend’ and the forum to “explore large-scale, next-generation data analytics in support of security operations” fits squarely within the core mission and vision of MantisNet.
Tags: Real-Time Monitoring, mantis
The Ultimate Cyber Security Strategy: Is Data-in-Motion The Answer?
Before we can address the optimum method for responding to the continuously evolving cyber threat landscape, we need to understand the sources and types of data available from which we can understand and make decisions about the health and security of our systems.
Tags: cyber security, Real-Time Monitoring, Data-at-Rest, Data-In-Motion, mantis
Cyber Security Strategies that Make Data-at-Rest Obsolete
The world of cyber security is complex and misunderstood by a majority of the public. Even in IT, few people understand the complexities of a sophisticated cyber attack. It's this lack of understanding and the low number of experts in the field that give cyber attackers an advantage.
Tags: cyber security, Data-at-Rest
The Latest Verizon Data Breach Report: Your Data is Gone Within Minutes
Verizon released its latest Data Breach Investigation Report (DBIR) highlighting the latest trends in malware and cyber crime, covering 53,000 incidents and 2,216 confirmed breaches. The report reveals that botnets are the most widespread, dangerous attacks to date. The number of botnet attacks reported was so numerous that all 43,000 breaches (mainly on financial data) were excluded from overall statistics and given a separate section of its own. With botnet breaches on the rise, Verizon's report confirms that monitoring network traffic is more important than ever.