Preventing Threat Intelligence Overload

Security professionals generally agree that the demand for threat intelligence is growing. With the ability to focus security teams and tools on the most relevant and high-risk threats, the context and tailored priority that threat intelligence feeds provide are undisputed benefits. While it sounds like a win/win situation—the threat intel comes in, it’s applied, and … Continue reading Preventing Threat Intelligence Overload

App Spotlight: ReversingLabs: Real-Time Classification of Malware Samples

In the first of a new series spotlighting Phantom Apps, today we’re highlighting the integration between Phantom’s Security Automation and Orchestration (SA&O) platform and the ReversingLabs A1000 Malware Analysis Platform. Gaining analyst productivity is paramount to improving your organization’s security posture against file-based threats. One way to increase a team’s productivity is by automating the … Continue reading App Spotlight: ReversingLabs: Real-Time Classification of Malware Samples

Playbook Series: Rootkits: Automatically Remediate Virtual Machines

Most security professionals will agree; the most reliable way to remediate Rootkit infections on Virtual Machines (VMs) is to re-image or revert the virtual machine to a pre-infected state. Today’s entry to our playbook series examines a Phantom playbook, included with our version 2.0 release of the platform, that automates this scenario. A visual representation … Continue reading Playbook Series: Rootkits: Automatically Remediate Virtual Machines