You Cannot Detect What You Did Not Keep: Why File Retention Is the Missing Security Control
ATT&CK techniques detected
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
TL;DR Security teams invest heavily in detection. But detection requires data, and the data most organizations keep is not the data investigations actually need. Logs record that something happened. Files reveal what it actually was. Attackers plan around retention windows. Hash lookups break the moment a payload is recompiled. A private file corpus that retains […]
The post You Cannot Detect What You Did Not Keep: Why File Retention Is the Missing Security Control appeared first on Stairwell.