Carbon Black Proposes Updated Cybersecurity Kill Chain Model to Help Defenders Stay Ahead of Modern Attacks

 Real Wire

New “Cognitive Attack Loop” helps defenders better understand modern cybercriminal cognitions via an attack cycle comprising three distinct phases

Reading, UK. 31st July 2019 — Carbon Black (NASDAQ: CBLK), a leader in cloud-native endpoint protection today released a ground-breaking white paper that proposes an updated cybersecurity kill chain model to help defenders stay ahead of evolving cyberattacks.

The paper, “Cognitions of a Cybercriminal: Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behaviour,” delves into the various ways cybercriminals have evolved in recent years and offers specific guidelines for CISOs and security professionals to help manage risk.

“We believe cybersecurity professionals should be looking at existing kill chain models with a new lens,” said Tom Kellermann, Carbon Black’s Chief Cybersecurity Officer and the paper’s primary author. “It’s no longer helpful to approach cybersecurity linearly. Cognitions and context are critical and help reveal attackers’ intent. Understanding the root cause of attacks and the way attackers think is paramount to good cybersecurity. With the ‘Cognitive Attack Loop,’ we’re offering defenders an updated model at how attackers think and behave.”

The paper outlines, in detail, the three phases proposed in the Cognitive Attack Loop - Recon & Infiltrate; Maintain & Manipulate; and Execute & Exfiltrate.

The Cognitive Attack Loop was borne from insight provided by Carbon Black’s cloud-native endpoint protection platform (EPP), which collects terabytes of data per day from around the globe, as well as insights from the Carbon Black Threat Analysis Unit (TAU).

“The more insight defenders have into cybercriminal behaviour, the more effective technology can be in recognising and stopping suspicious activity,” Kellermann said. “The patterns we see in attack data transcend any individual attack and allow us to provide protection against a broad set of threats without relying on specific pre-discovered indicators of compromise (IOCs). With the Cognitive Attack Loop, we’ve taken the various insights from our cloud-native EPP and our threat research efforts to arrive at a modern cycle that helps uncover cybercriminal behaviour and gives defenders a true sense of how modern attackers are operating.”

Click here to download the full paper from Carbon Black:

Domain: Electronics
Contributing Organization:
Contact Person Address:
Posted By: Real Wire and Contact Real Wire

Recent Press Releases

Trash Rakes Market Forecast, Growth ...

Trash rakes have always been a part of hydroelectric power plants, preventing debris from entering the plant. Over the years, the trash rakes have gained increasing demand in water

18 October, 2019

Induction Sealing Machine Market For...

The induction sealing machines are used for cap sealing and threading of caps—both plastic as well as aluminum—of packaged products offered in the plastic bottles and

18 October, 2019

Acoustic Emission Testing Market Gro...

Acoustic emission testing is used for the analysis and detection of acoustic signals in order to gain valuable information regarding discontinuity in a material and its origin. Aco

18 October, 2019