Machine Learning Algorithms from a Detection Engineers’ Perspective

Detection engineers navigate unique scenarios when building detections, in addition to the challenges of new, complex threats. This blog explores both from their perspective and key questions that arise during use case development.
How Network Detection and Response (NDR) Fills the Security Gaps of Intrusion Prevention Systems (IPS)

In order to identify and prevent threats, IPS relies on signature-based detection. However, this can cause various blind spots and weaknesses in network protection. NDR can overcome these drawbacks for more reliable and holistic protection against intrusions.
Switzerland’s Security Situation: Hybrid Threats Require Fundamental Defense Strategies

Switzerland’s security environment is becoming more complex from year to year, as reported by the Federal Intelligence Service (FIS) [Nachrichtendienst des Bundes (NDB)] in its annual report “Swiss Security 2024”. Of particular concern are international terrorism, current military conflicts, and increasing cooperation between various autocracies that cooperate at a political and military level. This development […]
Uncovering Blind Spots: Zero-Day Exploit Detection

Why NDR is crucial to detect zero-day exploits Understanding Zero-Day Exploits Within the realm of cybersecurity, zero-day exploits pose a unique challenge to consumers and vendors alike; how do you identify and mitigate the risks of an unknown vulnerability in real time? These threats exploit vulnerabilities in software, hardware, or protocols that are not yet […]
How to Detect the Microsoft Exchange Hack

This article shows how Exeon helps detect Microsoft Exchange server compromises through automated anomaly detection and manual traffic analysis—providing vital visibility in one of the largest cyberattacks.
Beyond IT Security: OT Network Protection

Why is Visibility into OT Networks Pivotal? The significance of Operational Technology (OT) for businesses is irrefutable, flourishing alongside the thriving IT sector. OT includes industrial control systems, manufacturing equipment, and devices that oversee and manage industrial environments and critical infrastructures. In recent years, adversaries have begun exploiting the frequent lack of detection and protection […]
NIS2 & DORA: Managers Are Liable for Cybersecurity

Introduction Manager liability in connection with undetected cybersecurity incidents in Europe is subject to different legal frameworks, which can vary depending on the country and industry. NIS2 (Network and Information Systems Directive 2) and DORA (Digital Operational Resilience Act) are now intended to standardize the specific legal framework and regulations at the European level and provide new guidelines for […]
Smarter Cyber Threat Intelligence: FeedMeter

(Photo credit: ZHAW Zurich University of Applied Sciences) A Research & Development Project on Enhancing Cyber Defense Cyber Threat Intelligence: In today’s evolving cyber landscape, understanding the adversary through cyber threat intelligence (CTI) is essential for effective defense. However, managing CTI feeds remains a challenge due to the difficulty in assessing feed quality and the […]
SOC Visibility Triad & the Role of NDR Solutions

How the SOC Visibility Triad enhances threat detection by combining SIEM, NDR, and EDR for stronger cybersecurity, and what specific aspects are to consider for holistic IT security.
Live the IT/OT Convergence, Enhance Security!

From Data to Defense: How to Better Integrate IT with OT The idea of technological convergence is not exactly new. By integrating different technologies and making them work together efficiently as a single, cohesive system, companies can increase their efficiency, reduce errors, lower costs, improve workflows and achieve measurable competitive advantages. Enterprise IT has long […]