Addressing Security Compliance Challenges with DTonomy
Addressing Security Compliance Challenges with DTonomy

Security compliance is a legal concern for organizations in many industries today due to regulatory standards such as PCI DSS, HIPAA, and ISO 27001 that prescribe recommendations for protecting data. Failure to meet compliance regulations can result in significant legal and financial penalties.   This risk is exacerbated by organizations moving data to the cloud as

Cybersecurity Image showcasing artificial intelligence also known as AI
AI Augments Triage, Analysis and Response

Some Sobering Statistics on the State of Security Operations   The recent Forrester 2020 State of Security Operations Survey stated that  The average security team receives over 11,000 alerts per day  The vast majority of these alerts must be manually processed and SecOps teams are unable to keep up with the volume  79% of surveyed businesses have experienced a breach

SIEM vs SOAR DTonomy graphic with cybersecurity logo
SIEM vs SOAR– Comparing and contrasting SIEM and SOAR

In the world of cybersecurity, there are many different acronyms. Two popular acronyms that are often used interchangeably are SIEM and SOAR. Both tools focus on helping cybersecurity teams become hyper-efficient, but they do differ in how exactly they work.   Before going any further, it is important to understand what exactly the acronyms SIEM and

Technology abstract background. Geometric texture with molecular structures and chemical engineering. Abstract background of hexagons pattern
Responding to Network Alerts on Port Scanning and Brute Force Attacks

Quite often, security teams receive network alerts by their network monitoring systems that someone is scanning ports or there is a possible brute force attack on one or more servers. According to the SANS Institute, port scanning is one of the most popular techniques attackers use to discover services that they can exploit to break into systems.

DTonomy AIR Assisted Incident Response for Office 365 Related Threats

Office 365, one of largest SaaS platforms used by organizations, is constantly on the radar of malicious hackers. Companies store volumes of mission critical and sensitive data on the platform, which they assume is protected and secure.   A recent report found that 25% of phishing attacks are able to circumvent Microsoft 365 security. The more common ways that

guided investigation
Three Reasons CISOs Need Guided Investigation and Response

Several converging trends have contributed to highly challenging times with regard to cybersecurity which are making guided investigation and response essential. #1 – Cyberattacks are the Fastest Growing Crime in the US   According to Cybersecurity Ventures, cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophistication and cost. Cybercrime will cost the

Reducing Mean Time to Response (MTTR) with Security Automation

Mean Time to Response (MTTR) is one of the most important aspects of any cybersecurity organization. The recent breach at Blackbaud, a cloud software company that helps non-profits to support their philanthropic efforts, has had serious ramifications on the company, the non-profits that they serve, and the donors that support them across their digital supply chain. 

Monitoring and Remediation of Cloudflare Incidents

Cloudflare is a service designed to protect websites from attacks while simultaneously optimizing performance. Unfortunately, Cloudflare accounts can be and have been compromised or the service can be down altogether. A recent outage on July 17 that was blamed on a configuration error has impacted one of our customers. The customer was not aware of this

DTonomy’s Free G Suite and Gmail Plugin

As phishing email attacks become more sophisticated and more businesses and educational institutions continue to support remote work options, having a fast phishing alert system is critical to avoid data breaches. Phish AIR is a free email add-in developed by DTonomy, which provides users an easy-to-use tool for acquiring important information about suspicious and potentially malicious phishing

Revealing Phishing Attack Themes Over Recent Years

Phishing emails are a type of online scam where criminals send an email that appears to be from a legitimate company and ask you to provide sensitive information. This is usually done by including a link that will appear to take you to the company’s website to fill in your information – but the website

We are pleased to announce that DTonomy is now part of Stellar Cyber. The integrated solution will enhance cyber threat detection and response automation!

X