Lock and Code

Threat hunting: How MDR secures your business


Listen Later

A cyberattack is not the same thing as malware—in fact, malware itself is typically the last stage of an attack, the punctuation mark that closes out months of work from cybercriminals who have infiltrated a company, learned about its systems and controls, and slowly spread across its network through various tools, some of which are installed on a device entirely by default. 

The goal of cybersecurity, though, isn't to recover after an attack, it's to stop an attack before it happens. 

On today's episode of the Lock and Code with host David Ruiz, we speak to two experts at Malwarebytes about how they've personally discovered and stopped attacks in the past and why many small- and medium-sized businesses should rely on a newer service called Managed Detection and Response for protecting their own systems. 

Many organizations today will already be familiar with the tool called Endpoint Detection and Response (EDR), the de facto cybersecurity tool that nearly every vendor makes that lets security teams watch over their many endpoints and respond if the software detects a problem. But the mass availability of EDR does not mean that cybersecurity itself is always within arm's reach. Countless organizations today are so overwhelmed with day-to-day IT issues that monitoring cybersecurity can be difficult. The expertise can be lacking at a small company. The knowledge of how to configure an EDR tool to flag the right types of warning signs can be missing. And the time to adequately monitor an EDR tool can be in short supply.

This is where Managed Detection and Response—MDR—comes in. More a service than a specific tool, MDR is a way for companies to rely on a team of experienced analysts to find and protect against cyberattacks before they happen. The power behind MDR services are its threat hunters, people who have prevented ransomware from being triggered, who have investigated attackers’ moves across a network, who have pulled the brakes on a botnet infection.

These threat hunters can pore over log files and uncover, for instance, a brute force attack against a remote desktop protocol port, or they can recognize a pattern of unfamiliar activity coming from a single account that has perhaps been compromised, or they can spot a ransomware attack in real time, before it has launched, even creating a new rule to block an entirely new ransomware variant before it has been spotted in the wild. Most importantly, these threat hunters can do what software cannot, explained Matt Sherman, senior manager of MDR delivery services. They can stop the people behind an attack, not just the malware those people are deploying. 

"Software stops software, people stop people."

Today, we speak with Sherman and MDR lead analyst AnnMarie Nayiga about how they find attacks, what attacks they've stopped in the past, why MDR offers so many benefits to SMBs, and what makes for a good threat hunter.

You can also find us on Apple PodcastsSpotify, and Google Podcasts, plus whatever preferred podcast platform you use.

Show notes and credits:

Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)

Licensed under Creative Commons: By Attribution 4.0 License
http://creativecommons.org/licenses/by/4.0/
Outro Music: “Good God” by Wowa (unminus.com)

 

...more
View all episodesView all episodes
Download on the App Store

Lock and CodeBy Malwarebytes

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

42 ratings


More shows like Lock and Code

View all
Freakonomics Radio by Freakonomics Radio + Stitcher

Freakonomics Radio

32,010 Listeners

WSJ Opinion: Potomac Watch by Paul Gigot, The Wall Street Journal

WSJ Opinion: Potomac Watch

2,836 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,010 Listeners

Talking Real Money - Investing Talk by Don McDonald

Talking Real Money - Investing Talk

758 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,024 Listeners

The Clark Howard Podcast by Clark Howard

The Clark Howard Podcast

5,450 Listeners

Click Here by Recorded Future News

Click Here

418 Listeners

Bold Names by The Wall Street Journal

Bold Names

1,446 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

All-In with Chamath, Jason, Sacks & Friedberg

9,938 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

139 Listeners

What the Hack? by DeleteMe

What the Hack?

221 Listeners

The 404 Media Podcast by 404 Media

The 404 Media Podcast

386 Listeners

The Kim Komando Show by Kim Komando

The Kim Komando Show

160 Listeners

Decoding Retirement by Yahoo Finance

Decoding Retirement

21 Listeners