Using AI in Cybersecurity: How DeepSeas Leverages AI
Nate Hausrath, VP of Engineering at DeepSeas, dives into how DeepSeas leverages AI to provide persistent defense to clients.
Nate Hausrath, VP of Engineering at DeepSeas, dives into how DeepSeas leverages AI to provide persistent defense to clients.
Nate Hausrath, VP of Engineering at DeepSeas, dives into how DeepSeas leverages AI to provide persistent defense to clients.
Stay ahead of cyber threats with DeepSeas’ Monthly Cyber Threat Intel Rollup.
Building an AI risk management program involves a multi-layered approach that starts with strategy and governance before moving on to technical solutions. The first step is to develop a risk strategy that includes understanding data classification, assessing specific AI-related risks, and adopting acceptable use policies.
There are key differences between a vulnerability assessment and penetration testing. Does your team use these terms interchangeably?
Stay ahead of cyber threats with DeepSeas’ Monthly Cyber Threat Intel Rollup.
Who will be the most likely to benefit from this document? The following cyber professionals will benefit from the ISO 27002:2013 to ISO 27002:2022 Control Mapping document provided below. CISOs CIOs Compliance Managers Information Security Managers Security Directors IT Directors What challenges are you likely facing that would make this
Are you ready to transform your cybersecurity program but don’t have the budget to expand your in-house team? Use the list of questions below to determine if you could benefit from a DeepSeas virtual CISO (vCISO) or Deputy CISO.
A web server with RDP access had been brute forced by an actor who the DeepSeas cyber threat intelligence crew believes may have been trying to deliver and execute Trigona ransomware. The intruder performed many different malicious actions in the client’s environment after gaining initial access; establishing persistence, escalating privileges, evading defenses, performing asset discovery, conducting lateral movement, data collection, and more. Upon review of the intruder’s activities DeepSeas noted that some of the tactics, techniques, and procedures (TTPs) matched previously observed TTPs associated with the actor responsible for the Trigona ransomware.
DeepSeas cyber defenders are seeing reports of increased attacks by threat actors against edge devices. There are several ways criminals have targeted edge devices, and organizations reporting incidents related to third parties.
At DeepSeas, we're committed to helping you understand everything involved in transforming your cybersecurity program. Below are initial FAQs to get you started.
21% of the DeepSeas crew are Veterans or Active Military Reservists. Join our talented crew of cyber experts.