Intrusion的封面图片
Intrusion

Intrusion

计算机和网络安全

Plano,Texas 2,463 位关注者

#1 Applied Threat Intelligence

关于我们

Intrusion exposes previously undetected network communications. Using applied threat intelligence, we monitor and block suspicious network comms in real-time, inbound and outbound.

网站
https://www.intrusion.com
所属行业
计算机和网络安全
规模
51-200 人
总部
Plano,Texas
类型
上市公司
创立
1983
领域
cybersecurity、cybersecurityconsulting和cybersecurityservices

地点

Intrusion员工

动态

  • 查看Intrusion的组织主页

    2,463 位关注者

    Had a great time meeting with MSPs at The ChannelPro Network DEFEND event. Big shoutout to Gregory Akers, CCIE for taking the time to speak to other fellow MSPs about how you use Intrusion. We are thankful for you. When asked what the value of Intrusion was, he said we provide: ?? A great tool to quickly gain control of a difficult client cyber security environment. Including ones that are under active attack. ?? The best threat intel consolidation of any tool on the market. ?? A definitive last layer of a defense-in-depth protection?strategy. ?? A great place to start threat hunting in an environment. ?? A first step in engaging clients in meaningful protection dialogue, thus opening new avenues of engagement. That is awesome stuff. We look forward to meeting new people at the next DEFEND event in Boston. See ya then!

    • Greg Akers speaking to a fellow MSP about how he uses Intrusion.
    • 该图片无替代文字
  • 查看Intrusion的组织主页

    2,463 位关注者

    The secret to a healthy relationship? Paranoia. 1. Assume the worst intentions. In relationships, it's best to never fully trust anyone. Always assume negative intent. Listen to what they say, but always verify it with a third party. We're talking background checks, monitoring, etc. 2. Never let your guard down. Vulnerability will destroy a relationship. Never let someone get too close – they'll eventually exploit you. Keep your feelings locked down, and never show your true self. It's just safer that way. 3. Be around, always. Especially when you first meet. Constant surveillance is key to a healthy relationship. Know their every move, and always be one step ahead. Some may label it stalking, but it's really just information gathering. Looks like the rules of love and cybersecurity are the same. Who knew?

    • I love you enough to make our iphone samsung relationship work
  • 查看Intrusion的组织主页

    2,463 位关注者

    Baselining networks is a flawed pursuit. Can't you just determine what 'normal' traffic looks like on a network and flag everything else as suspicious? It's a great idea, in theory, but the problem is that a typical organization's traffic is incredibly diverse. Millions of domains and IPs are requested every month for everything from web browsing to APIs and vendor communications. To illustrate this, we logged network traffic (DNS requests and IP communications) in a medium-sized organization over the course of 3 months and took note of the overlap from month to month. On average, there were about 800,000 unique domain requests each month, but only 42% of these overlapped from month to month. And over a 3 month period, there was only a 30% overlap. We found the same to be true with IPs. We looked at unique destination server IPs and outbound TCP communications. Around 1-2 million distinct server IPs were observed per month, but only a 25% overlap from month to month. If you're not using a threat intelligence tool for domain and IP reputation, you should. IP and domain reputation intelligence can mistakingly be viewed as outdated or too basic to protect you from modern threats, but we've found the opposite to be true. The internet is a moving target. Blocking connections from unknown or untrusted IPs and domains can disrupt threat lifecycles and should be considered a critical component of your security strategy.

    • There's no such thing as "normal"
  • 查看Intrusion的组织主页

    2,463 位关注者

    We're here at DEFEND ?? for the very first time! Looking forward to connecting and learning more about your challenges with cybersecurity. Our CEO Tony Scott will be on the main stage today at 11:45AM to talk about "The Unwatched Door" and how monitoring and controlling outbound traffic is key to NOT getting hacked. We've got a special offer for attendees, so be sure to stop by our booth and meet Andrew Wildrix + Suzanne Fulco! ?? Shout out to The ChannelPro Network for putting on an awesome event.

    • Andrew and Suzanne at the Intrusion booth
  • 查看Intrusion的组织主页

    2,463 位关注者

    It's getting trickier to detect phishing emails. Even for email security tools. The most prolific phishing tactic in 2024 is....impersonation. These impersonation emails are looking real legit. And no one wants to be accused of not following up on something important or not doing their job. An Egress report shows signature-based email protection gateways and Microsoft 365 did not protect from obfuscation techniques used by attackers in nearly 17% of impersonation emails. What happens after someone clicks the link? Or opens the attachment? There are several measures that can be taken to prevent a successful attack. – Something that doesn't allow users to reach the unsafe link destination. – Something that doesn't allow the malware's outbound communication to its control and command server. – Something that doesn't allow incoming or outgoing communications from suspicious or known malicious IPs. Implementing a tool like Intrusion Shield can help protect your business even when impersonation emails slip through the cracks.

    • Payloads used in impresonation attacks detected by egress defend
  • 查看Intrusion的组织主页

    2,463 位关注者

    Relying solely on signature-based solutions is a huge security concern. ?? They don't protect against zero-day attacks Signature-based solutions can't detect unknown or newly released threats, leaving you vulnerable to zero-day attacks. This limitation allows new, unseen threats to bypass traditional security defenses. ?? They aren't effective against advanced threats Signature-based solutions struggle with sophisticated, targeted attacks, such as: - Polymorphic malware - Fileless malware - Social engineering - Advanced Persistent Threats (APTs) These threats often evade signature-based detection, requiring more advanced security measures. ?? They promote reactivity Signature-based solutions respond to known threats, not emerging ones. This reactive approach: - Relies on previous attacks to create signatures - Fails to anticipate new threats - Leaves you exposed to unknown threats Incorporating tools that are reputation-based, behavior-based, or use applied threat intelligence is necessary to protect your network from unknown threats.

  • 查看Intrusion的组织主页

    2,463 位关注者

    The majority of the internet is grey. Meaning it has little to no reputation. The domains aren't necessarily bad, but they also shouldn't be considered trustworthy. These may be – newly registered domains – sites that have existed for a while but with no content – sites that seemingly have no legitimate purpose These often require manual review and investigation to determine their true intentions. Determining what action to take is less of a binary good/bad and more of a risk tolerance calculation. But who has time for that? Well, we do. We can help mitigate risk by filtering out the internet noise. The questionable stuff that can eat up a lot of your time. The threat adjacent stuff. The stuff we shouldn't be letting our networks communicate with but are because there's never been a great solution to manage it. If you're curious, reach out to us.

    • It's not as simple as "good" or "bad"

There are over 1 billion IPs and domains. Most fall somewhere in the gray reputation category.
  • 查看Intrusion的组织主页

    2,463 位关注者

    Shout out to our co-founder Joe – we're lucky to have one of the smartest (and hilarious) people in cyber ??

  • 查看Intrusion的组织主页

    2,463 位关注者

    Those seemingly harmless IoT devices can, and often are, used as a gateway to gain access to your crown jewels. If you find that an IoT device is communicating to places it doesn't normally communicate with it may be a sign that someone is attempting to hack your network and should be looked into. Just another reason why monitoring outbound comms is highly critical. #IoT #cybersecurity

相似主页

查看职位

融资

Intrusion 共 4 轮

上一轮

上市后股权

US$7,500,000.00

Crunchbase 上查看更多信息