<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>Atlanta News Plus &#45; fidelissecurity</title>
<link>https://www.atlantanewsplus.com/rss/author/fidelissecurity</link>
<description>Atlanta News Plus &#45; fidelissecurity</description>
<dc:language>en</dc:language>
<dc:rights>Copyright 2025 atlantanewsplus.com &#45; All Rights Reserved.</dc:rights>

<item>
<title>Active Defense vs Passive Monitoring: Where Deception Excels</title>
<link>https://www.atlantanewsplus.com/active-defense-vs-passive-monitoring-where-deception-excels</link>
<guid>https://www.atlantanewsplus.com/active-defense-vs-passive-monitoring-where-deception-excels</guid>
<description><![CDATA[ The critical differences between active defense and passive monitoring, and examine why deception excels in detecting, delaying, and derailing advanced adversaries. ]]></description>
<enclosure url="https://www.atlantanewsplus.com/uploads/images/202507/image_870x580_686b7e76665e5.jpg" length="81574" type="image/jpeg"/>
<pubDate>Mon, 07 Jul 2025 13:59:59 +0600</pubDate>
<dc:creator>fidelissecurity</dc:creator>
<media:keywords>deceptive technology, deception security, deception platform, deception solution, Active Defense, Passive Monitoring</media:keywords>
<content:encoded><![CDATA[<p data-start="83" data-end="488">In the ever-evolving cybersecurity landscape, organizations face a relentless onslaught of sophisticated threats. While many have relied on traditional security approaches like firewalls, SIEM, and endpoint protection platforms, these largely passive monitoring tools often fall short against stealthy, persistent attackers. This is where deception technologya key component of active defenseshines.</p>
<p data-start="490" data-end="679">In this blog, we explore the critical differences between active defense and passive monitoring, and examine why deception excels in detecting, delaying, and derailing advanced adversaries.</p>
<h2 data-start="686" data-end="738">Understanding Passive Monitoring in Cybersecurity</h2>
<p data-start="740" data-end="1002">Passive monitoring refers to security practices that involve observing network traffic and system behavior without interfering or altering the environment. These tools are designed to detect known threats based on pre-defined rules, signatures, or baselines.</p>
<h3 data-start="1004" data-end="1040">Common Passive Monitoring Tools:</h3>
<ul data-start="1041" data-end="1306">
<li data-start="1041" data-end="1156">
<p data-start="1043" data-end="1156"><strong data-start="1043" data-end="1096">SIEM (Security Information and Event Management):</strong> Aggregates and correlates logs from across the environment.</p>
</li>
<li data-start="1157" data-end="1230">
<p data-start="1159" data-end="1230"><strong data-start="1159" data-end="1197">IDS (Intrusion Detection Systems):</strong> Detects known attack signatures.</p>
</li>
<li data-start="1231" data-end="1306">
<p data-start="1233" data-end="1306"><strong data-start="1233" data-end="1274">NDR (<a href="https://fidelissecurity.com/threatgeek/network-security/what-is-ndr-network-detection-and-response/" rel="nofollow">Network Detection and Response</a>):</strong> Monitors traffic for anomalies.</p>
</li>
</ul>
<h3 data-start="1308" data-end="1346">Limitations of Passive Monitoring:</h3>
<ul data-start="1347" data-end="1625">
<li data-start="1347" data-end="1415">
<p data-start="1349" data-end="1415"><strong data-start="1349" data-end="1371">Delayed Detection:</strong> Often relies on post-incident log analysis.</p>
</li>
<li data-start="1416" data-end="1530">
<p data-start="1418" data-end="1530"><strong data-start="1418" data-end="1445">Blind to Novel Threats:</strong> Signature-based tools struggle with zero-days or advanced persistent threats (APTs).</p>
</li>
<li data-start="1531" data-end="1625">
<p data-start="1533" data-end="1625"><strong data-start="1533" data-end="1565">No Engagement with Attacker:</strong> Provides no feedback loop or context on adversary behavior.</p>
</li>
</ul>
<p data-start="1627" data-end="1807">Passive tools are crucial for visibility, but they operate in a reactive mode. By the time alerts are generated, an attacker might have already exfiltrated data or moved laterally.</p>
<h2 data-start="1814" data-end="1840">What is Active Defense?</h2>
<p data-start="1842" data-end="2098">Active defense involves strategies that engage with the adversary, disrupt their operations, and gather intelligence about their tactics. This approach is proactive, aiming not just to detect threats, but to mislead, delay, and study them in real-time.</p>
<h3 data-start="2100" data-end="2138">Characteristics of Active Defense:</h3>
<ul data-start="2139" data-end="2455">
<li data-start="2139" data-end="2232">
<p data-start="2141" data-end="2232"><strong data-start="2141" data-end="2173">Engagement Over Observation:</strong> Involves interacting with threats through decoys or traps.</p>
</li>
<li data-start="2233" data-end="2343">
<p data-start="2235" data-end="2343"><strong data-start="2235" data-end="2270">Threat Intelligence Generation:</strong> Provides insight into attacker tools, techniques, and procedures (TTPs).</p>
</li>
<li data-start="2344" data-end="2455">
<p data-start="2346" data-end="2455"><strong data-start="2346" data-end="2375">Environment Manipulation:</strong> Changes the attack surface dynamically, increasing attacker confusion and risk.</p>
</li>
</ul>
<p data-start="2457" data-end="2529">Deception technology is a prime example of active defense in action.</p>
<h2 data-start="2536" data-end="2593">Deception Technology: The Powerhouse of Active Defense</h2>
<p data-start="2595" data-end="2829">Deception involves deploying decoys, honeypots, breadcrumbs, and lures that mimic legitimate assets to entice attackers. Once engaged, these traps alert defenders to unauthorized activityoften at the earliest stages of intrusion.</p>
<h3 data-start="2831" data-end="2873">Key Components of Deception Platforms:</h3>
<ul data-start="2874" data-end="3165">
<li data-start="2874" data-end="2984">
<p data-start="2876" data-end="2984"><strong data-start="2876" data-end="2893">Decoy Assets:</strong> Fake servers, applications, databases, or IoT devices indistinguishable from real systems.</p>
</li>
<li data-start="2985" data-end="3073">
<p data-start="2987" data-end="3073"><strong data-start="2987" data-end="3008">Credential Lures:</strong> Planted passwords or keys designed to be picked up by intruders.</p>
</li>
<li data-start="3074" data-end="3165">
<p data-start="3076" data-end="3165"><strong data-start="3076" data-end="3108">Deceptive Network Artifacts:</strong> DNS entries, mapped drives, and fake domain controllers.</p>
</li>
</ul>
<h2 data-start="3172" data-end="3221">Where Deception Excels Over Passive Monitoring</h2>
<h3 data-start="3223" data-end="3269">1. <strong data-start="3230" data-end="3269">Early Detection of Lateral Movement</strong></h3>
<p data-start="3270" data-end="3515">While passive tools may detect malware at the endpoint or anomalies in data access, deception identifies lateral movement as soon as an attacker interacts with a decoy. This often happens well before any traditional indicators are triggered.</p>
<blockquote data-start="3517" data-end="3683">
<p data-start="3519" data-end="3683"><strong data-start="3519" data-end="3531">Example:</strong> An attacker scans the network and touches a deceptive server posing as an HR system. Immediate alerts are triggeredwithout any impact on real systems.</p>
</blockquote>
<h3 data-start="3685" data-end="3715">2. <strong data-start="3692" data-end="3715">Low False Positives</strong></h3>
<p data-start="3716" data-end="3926">Unlike anomaly-based monitoring that may trigger alerts on legitimate user behavior, deception-based alerts are high-fidelity. Any interaction with a decoy is inherently suspiciousreducing analyst fatigue.</p>
<h3 data-start="3928" data-end="3966">3. <strong data-start="3935" data-end="3966">Attack Surface Manipulation</strong></h3>
<p data-start="3967" data-end="4214">Deception doesn't just monitor the existing environmentit creates a parallel battlefield for attackers. By filling the environment with enticing but fake assets, deception dilutes the attacker's view and increases the likelihood of detection.</p>
<h3 data-start="4216" data-end="4266">4. <strong data-start="4223" data-end="4266">Threat Actor Engagement and Attribution</strong></h3>
<p data-start="4267" data-end="4472">Once engaged, attackers can be studied in real-time. Security teams can analyze tools used, command patterns, and even trace back to known threat groupssomething passive systems cannot do effectively.</p>
<h3 data-start="4474" data-end="4522">5. <strong data-start="4481" data-end="4522">Increased Attacker Cost and Confusion</strong></h3>
<p data-start="4523" data-end="4707">Deception wastes attacker time and resources. The more decoys they encounter, the higher the risk of exposure. It becomes a psychological gamewho can you trust in the environment?</p>
<h2 data-start="4714" data-end="4760">Use Cases Where Deception Is a Game Changer</h2>
<div class="_tableContainer_80l1q_1">
<div class="_tableWrapper_80l1q_14 group flex w-fit flex-col-reverse" tabindex="-1">
<table data-start="4762" data-end="5305" class="w-fit min-w-(--thread-content-width)">
<thead data-start="4762" data-end="4826">
<tr data-start="4762" data-end="4826">
<th data-start="4762" data-end="4798" data-col-size="sm">Use Case</th>
<th data-start="4798" data-end="4826" data-col-size="md">Why Deception Works Well</th>
</tr>
</thead>
<tbody data-start="4892" data-end="5305">
<tr data-start="4892" data-end="4996">
<td data-start="4892" data-end="4927" data-col-size="sm"><strong data-start="4894" data-end="4922">Insider Threat Detection</strong></td>
<td data-col-size="md" data-start="4927" data-end="4996">Traps malicious insiders who access sensitive but fake resources.</td>
</tr>
<tr data-start="4997" data-end="5105">
<td data-start="4997" data-end="5032" data-col-size="sm"><strong data-start="4999" data-end="5024">Supply Chain Security</strong></td>
<td data-col-size="md" data-start="5032" data-end="5105">Decoys can identify unauthorized access from third-party connections.</td>
</tr>
<tr data-start="5106" data-end="5206">
<td data-start="5106" data-end="5141" data-col-size="sm"><strong data-start="5108" data-end="5131">OT/ICS Environments</strong></td>
<td data-col-size="md" data-start="5141" data-end="5206">Lightweight deception sensors can mimic SCADA or PLC devices.</td>
</tr>
<tr data-start="5207" data-end="5305">
<td data-start="5207" data-end="5242" data-col-size="sm"><strong data-start="5209" data-end="5242">Cloud and Hybrid Environments</strong></td>
<td data-col-size="md" data-start="5242" data-end="5305">Lures across cloud services detect token or API key misuse.</td>
</tr>
</tbody>
</table>
<div class="sticky end-(--thread-content-margin) h-0 self-end select-none">
<div class="absolute end-0 flex items-end"><span class="" data-state="closed"><button aria-label="Copy Table" class="hover:bg-token-bg-tertiary text-token-text-secondary my-1 rounded-sm p-1 transition-opacity group-[:not(:hover):not(:focus-within)]:pointer-events-none group-[:not(:hover):not(:focus-within)]:opacity-0"><svg width="20" height="20" viewbox="0 0 20 20" fill="currentColor" xmlns="http://www.w3.org/2000/svg" class="icon"><path d="M12.668 10.667C12.668 9.95614 12.668 9.46258 12.6367 9.0791C12.6137 8.79732 12.5758 8.60761 12.5244 8.46387L12.4688 8.33399C12.3148 8.03193 12.0803 7.77885 11.793 7.60254L11.666 7.53125C11.508 7.45087 11.2963 7.39395 10.9209 7.36328C10.5374 7.33197 10.0439 7.33203 9.33301 7.33203H6.5C5.78896 7.33203 5.29563 7.33195 4.91211 7.36328C4.63016 7.38632 4.44065 7.42413 4.29688 7.47559L4.16699 7.53125C3.86488 7.68518 3.61186 7.9196 3.43555 8.20703L3.36524 8.33399C3.28478 8.49198 3.22795 8.70352 3.19727 9.0791C3.16595 9.46259 3.16504 9.95611 3.16504 10.667V13.5C3.16504 14.211 3.16593 14.7044 3.19727 15.0879C3.22797 15.4636 3.28473 15.675 3.36524 15.833L3.43555 15.959C3.61186 16.2466 3.86474 16.4807 4.16699 16.6348L4.29688 16.6914C4.44063 16.7428 4.63025 16.7797 4.91211 16.8027C5.29563 16.8341 5.78896 16.835 6.5 16.835H9.33301C10.0439 16.835 10.5374 16.8341 10.9209 16.8027C11.2965 16.772 11.508 16.7152 11.666 16.6348L11.793 16.5645C12.0804 16.3881 12.3148 16.1351 12.4688 15.833L12.5244 15.7031C12.5759 15.5594 12.6137 15.3698 12.6367 15.0879C12.6681 14.7044 12.668 14.211 12.668 13.5V10.667ZM13.998 12.665C14.4528 12.6634 14.8011 12.6602 15.0879 12.6367C15.4635 12.606 15.675 12.5492 15.833 12.4688L15.959 12.3975C16.2466 12.2211 16.4808 11.9682 16.6348 11.666L16.6914 11.5361C16.7428 11.3924 16.7797 11.2026 16.8027 10.9209C16.8341 10.5374 16.835 10.0439 16.835 9.33301V6.5C16.835 5.78896 16.8341 5.29563 16.8027 4.91211C16.7797 4.63025 16.7428 4.44063 16.6914 4.29688L16.6348 4.16699C16.4807 3.86474 16.2466 3.61186 15.959 3.43555L15.833 3.36524C15.675 3.28473 15.4636 3.22797 15.0879 3.19727C14.7044 3.16593 14.211 3.16504 13.5 3.16504H10.667C9.9561 3.16504 9.46259 3.16595 9.0791 3.19727C8.79739 3.22028 8.6076 3.2572 8.46387 3.30859L8.33399 3.36524C8.03176 3.51923 7.77886 3.75343 7.60254 4.04102L7.53125 4.16699C7.4508 4.32498 7.39397 4.53655 7.36328 4.91211C7.33985 5.19893 7.33562 5.54719 7.33399 6.00195H9.33301C10.022 6.00195 10.5791 6.00131 11.0293 6.03809C11.4873 6.07551 11.8937 6.15471 12.2705 6.34668L12.4883 6.46875C12.984 6.7728 13.3878 7.20854 13.6533 7.72949L13.7197 7.87207C13.8642 8.20859 13.9292 8.56974 13.9619 8.9707C13.9987 9.42092 13.998 9.97799 13.998 10.667V12.665ZM18.165 9.33301C18.165 10.022 18.1657 10.5791 18.1289 11.0293C18.0961 11.4302 18.0311 11.7914 17.8867 12.1279L17.8203 12.2705C17.5549 12.7914 17.1509 13.2272 16.6553 13.5313L16.4365 13.6533C16.0599 13.8452 15.6541 13.9245 15.1963 13.9619C14.8593 13.9895 14.4624 13.9935 13.9951 13.9951C13.9935 14.4624 13.9895 14.8593 13.9619 15.1963C13.9292 15.597 13.864 15.9576 13.7197 16.2939L13.6533 16.4365C13.3878 16.9576 12.9841 17.3941 12.4883 17.6982L12.2705 17.8203C11.8937 18.0123 11.4873 18.0915 11.0293 18.1289C10.5791 18.1657 10.022 18.165 9.33301 18.165H6.5C5.81091 18.165 5.25395 18.1657 4.80371 18.1289C4.40306 18.0962 4.04235 18.031 3.70606 17.8867L3.56348 17.8203C3.04244 17.5548 2.60585 17.151 2.30176 16.6553L2.17969 16.4365C1.98788 16.0599 1.90851 15.6541 1.87109 15.1963C1.83431 14.746 1.83496 14.1891 1.83496 13.5V10.667C1.83496 9.978 1.83432 9.42091 1.87109 8.9707C1.90851 8.5127 1.98772 8.10625 2.17969 7.72949L2.30176 7.51172C2.60586 7.0159 3.04236 6.6122 3.56348 6.34668L3.70606 6.28027C4.04237 6.136 4.40303 6.07083 4.80371 6.03809C5.14051 6.01057 5.53708 6.00551 6.00391 6.00391C6.00551 5.53708 6.01057 5.14051 6.03809 4.80371C6.0755 4.34588 6.15483 3.94012 6.34668 3.56348L6.46875 3.34473C6.77282 2.84912 7.20856 2.44514 7.72949 2.17969L7.87207 2.11328C8.20855 1.96886 8.56979 1.90385 8.9707 1.87109C9.42091 1.83432 9.978 1.83496 10.667 1.83496H13.5C14.1891 1.83496 14.746 1.83431 15.1963 1.87109C15.6541 1.90851 16.0599 1.98788 16.4365 2.17969L16.6553 2.30176C17.151 2.60585 17.5548 3.04244 17.8203 3.56348L17.8867 3.70606C18.031 4.04235 18.0962 4.40306 18.1289 4.80371C18.1657 5.25395 18.165 5.81091 18.165 6.5V9.33301Z"></path></svg></button></span></div>
</div>
</div>
</div>
<h2 data-start="5312" data-end="5358">Complementing, Not Replacing, Passive Tools</h2>
<p data-start="5360" data-end="5472">It's important to note that deception doesnt replace passive monitoringit enhances it. When used together:</p>
<ul data-start="5474" data-end="5616">
<li data-start="5474" data-end="5541">
<p data-start="5476" data-end="5541">Passive monitoring provides broad visibility and historical data.</p>
</li>
<li data-start="5542" data-end="5616">
<p data-start="5544" data-end="5616">Deception adds real-time, high-fidelity alerts and adversary engagement.</p>
</li>
</ul>
<p data-start="5618" data-end="5759"><strong data-start="5618" data-end="5654">Integrated defense is the future</strong>where deception feeds insights into SIEM, SOAR, and XDR platforms for a richer threat response strategy.</p>
<h2 data-start="5766" data-end="5783">Final Thoughts</h2>
<p data-start="5785" data-end="6013">The cybersecurity battlefield is no longer about just watching and logging eventsit's about taking control. <a href="https://fidelissecurity.com/solutions/deception/" rel="nofollow"><strong>Deception technology</strong></a> transforms your environment from a passive observer into an active participant in threat defense.</p>
<p data-start="6015" data-end="6193">By deceiving and deterring attackers early in the kill chain, organizations not only improve detection but gain strategic intelligence that passive monitoring cannot offer alone.</p>]]> </content:encoded>
</item>

<item>
<title>NDR in the Hotel Industry: Defending Guest Wi&#45;Fi and Payment Systems</title>
<link>https://www.atlantanewsplus.com/ndr-in-the-hotel-industry-defending-guest-wi-fi-and-payment-systems</link>
<guid>https://www.atlantanewsplus.com/ndr-in-the-hotel-industry-defending-guest-wi-fi-and-payment-systems</guid>
<description><![CDATA[ The hotel industry has witnessed several high-profile breaches over the past decade. Attackers exploit vulnerabilities in outdated infrastructure, unsegmented guest networks, weak access controls, and third-party integrations. ]]></description>
<enclosure url="https://www.atlantanewsplus.com/uploads/images/202507/image_870x580_686b7c6aab8ea.jpg" length="63184" type="image/jpeg"/>
<pubDate>Mon, 07 Jul 2025 13:51:15 +0600</pubDate>
<dc:creator>fidelissecurity</dc:creator>
<media:keywords>Network Detection and Response, NDR, ndr solutions, ndr platform, network detection and response (ndr)</media:keywords>
<content:encoded><![CDATA[<p data-start="81" data-end="717">In todays hyper-connected travel ecosystem, the hospitality industry has become an attractive target for cybercriminals. Hotels house not only hundreds or thousands of guests at any given time but also collect and store sensitive datafrom passport information to credit card details. With sprawling networks that include guest Wi-Fi, point-of-sale (POS) systems, booking portals, smart room technologies, and back-end administrative systems, the hotel industry faces significant cybersecurity challenges. Network Detection and Response (NDR) offers a powerful solution to help hoteliers protect both their guests and their operations.</p>
<h3 data-start="724" data-end="783"></h3>
<h3 data-start="724" data-end="783">Understanding the Cyber Threat Landscape in Hospitality</h3>
<p data-start="785" data-end="1039">The hotel industry has witnessed several high-profile breaches over the past decade. Attackers exploit vulnerabilities in outdated infrastructure, unsegmented guest networks, weak access controls, and third-party integrations. Key threat vectors include:</p>
<ul data-start="1041" data-end="1316">
<li data-start="1041" data-end="1079">
<p data-start="1043" data-end="1079"><strong data-start="1043" data-end="1079">Guest Wi-Fi misuse or compromise</strong></p>
</li>
<li data-start="1080" data-end="1138">
<p data-start="1082" data-end="1138"><strong data-start="1082" data-end="1138">Payment system breaches (POS malware, card skimming)</strong></p>
</li>
<li data-start="1139" data-end="1184">
<p data-start="1141" data-end="1184"><strong data-start="1141" data-end="1184">Credential stuffing on loyalty programs</strong></p>
</li>
<li data-start="1185" data-end="1253">
<p data-start="1187" data-end="1253"><strong data-start="1187" data-end="1253">Ransomware attacks targeting front-desk or reservation systems</strong></p>
</li>
<li data-start="1254" data-end="1316">
<p data-start="1256" data-end="1316"><strong data-start="1256" data-end="1316">Insider threats and disgruntled employees abusing access</strong></p>
</li>
</ul>
<p data-start="1318" data-end="1491">These threats not only disrupt service but also damage brand reputation, erode guest trust, and lead to regulatory fines under GDPR, PCI-DSS, and other data protection laws.</p>
<h3 data-start="1498" data-end="1538">Why Traditional Security Falls Short</h3>
<p data-start="1540" data-end="1898">Hotels often rely on perimeter defenses such as firewalls, endpoint protection, and antivirus tools. While these remain important, theyre insufficient against modern threats that exploit lateral movement, encrypted traffic, or insider access. Moreover, fragmented IT environments with siloed tools make visibility and threat correlation extremely difficult.</p>
<p data-start="1900" data-end="1964">This is where <a href="https://fidelissecurity.com/threatgeek/network-security/what-is-ndr-network-detection-and-response/" rel="nofollow"><strong data-start="1914" data-end="1954">Network Detection and Response</strong></a>steps in.</p>
<h3 data-start="1971" data-end="1987">What is NDR?</h3>
<p data-start="1989" data-end="2312">NDR is a cybersecurity solution that monitors network traffic in real-time, detects anomalous or malicious behavior using advanced analytics, and enables swift response to threats. Unlike signature-based tools, NDR leverages machine learning and behavioral analytics to identify previously unknown or sophisticated threats.</p>
<h3 data-start="2319" data-end="2361">Use Cases of NDR in the Hotel Industry</h3>
<h4 data-start="2363" data-end="2404">1. <strong data-start="2371" data-end="2404">Securing Guest Wi-Fi Networks</strong></h4>
<p data-start="2406" data-end="2652">Guest Wi-Fi networks are among the most vulnerable hotel assets, as they are inherently open and accessible to thousands of devices. Guests could unknowingly spread malware, or malicious actors could use the network for reconnaissance or attacks.</p>
<p data-start="2654" data-end="2672"><strong data-start="2654" data-end="2672">How NDR Helps:</strong></p>
<ul data-start="2673" data-end="2959">
<li data-start="2673" data-end="2736">
<p data-start="2675" data-end="2736">Monitors east-west traffic across guest subnets for anomalies</p>
</li>
<li data-start="2737" data-end="2815">
<p data-start="2739" data-end="2815">Detects botnet activity, lateral movement, or attempts to scan other devices</p>
</li>
<li data-start="2816" data-end="2903">
<p data-start="2818" data-end="2903">Identifies rogue access points or devices attempting man-in-the-middle (MITM) attacks</p>
</li>
<li data-start="2904" data-end="2959">
<p data-start="2906" data-end="2959">Enforces segmentation and alerts on policy violations</p>
</li>
</ul>
<h4 data-start="2961" data-end="3015">2. <strong data-start="2969" data-end="3015">Protecting Payment Systems and POS Devices</strong></h4>
<p data-start="3017" data-end="3205">POS systems are prime targets for malware like RAM scrapers and remote access trojans (RATs). Attackers often breach the network and pivot silently until they compromise financial systems.</p>
<p data-start="3207" data-end="3225"><strong data-start="3207" data-end="3225">How NDR Helps:</strong></p>
<ul data-start="3226" data-end="3497">
<li data-start="3226" data-end="3277">
<p data-start="3228" data-end="3277">Detects unusual outbound traffic from POS devices</p>
</li>
<li data-start="3278" data-end="3356">
<p data-start="3280" data-end="3356">Flags unauthorized access attempts or command-and-control (C2) communication</p>
</li>
<li data-start="3357" data-end="3437">
<p data-start="3359" data-end="3437">Correlates network activity to detect credential abuse or privilege escalation</p>
</li>
<li data-start="3438" data-end="3497">
<p data-start="3440" data-end="3497">Supports PCI-DSS compliance through continuous monitoring</p>
</li>
</ul>
<h4 data-start="3499" data-end="3548">3. <strong data-start="3507" data-end="3548">Monitoring IoT and Smart Room Devices</strong></h4>
<p data-start="3550" data-end="3712">Modern hotel rooms often include smart locks, lighting, HVAC systems, and voice-controlled assistants. These IoT devices increase the attack surface dramatically.</p>
<p data-start="3714" data-end="3732"><strong data-start="3714" data-end="3732">How NDR Helps:</strong></p>
<ul data-start="3733" data-end="3945">
<li data-start="3733" data-end="3800">
<p data-start="3735" data-end="3800">Profiles normal behavior for each device and alerts on deviations</p>
</li>
<li data-start="3801" data-end="3873">
<p data-start="3803" data-end="3873">Detects IoT-based DDoS attacks or unauthorized remote control attempts</p>
</li>
<li data-start="3874" data-end="3945">
<p data-start="3876" data-end="3945">Enables microsegmentation policies based on observed traffic patterns</p>
</li>
</ul>
<h4 data-start="3947" data-end="3983">4. <strong data-start="3955" data-end="3983">Insider Threat Detection</strong></h4>
<p data-start="3985" data-end="4132">Staff or contractors with legitimate access can unintentionally or deliberately pose threats. Monitoring their behavior on the network is critical.</p>
<p data-start="4134" data-end="4152"><strong data-start="4134" data-end="4152">How NDR Helps:</strong></p>
<ul data-start="4153" data-end="4340">
<li data-start="4153" data-end="4201">
<p data-start="4155" data-end="4201">Establishes baselines for normal user behavior</p>
</li>
<li data-start="4202" data-end="4272">
<p data-start="4204" data-end="4272">Alerts on data exfiltration attempts or unusual file access patterns</p>
</li>
<li data-start="4273" data-end="4340">
<p data-start="4275" data-end="4340">Flags movement between internal hotel systems that violate policy</p>
</li>
</ul>
<h4 data-start="4342" data-end="4390">5. <strong data-start="4350" data-end="4390">Threat Hunting and Incident Response</strong></h4>
<p data-start="4392" data-end="4520">NDR provides rich telemetry and historical context that empowers security teams to investigate and respond to incidents rapidly.</p>
<p data-start="4522" data-end="4540"><strong data-start="4522" data-end="4540">How NDR Helps:</strong></p>
<ul data-start="4541" data-end="4740">
<li data-start="4541" data-end="4594">
<p data-start="4543" data-end="4594">Enables retrospective analysis to trace root causes</p>
</li>
<li data-start="4595" data-end="4659">
<p data-start="4597" data-end="4659">Assists in understanding dwell time and lateral movement paths</p>
</li>
<li data-start="4660" data-end="4740">
<p data-start="4662" data-end="4740">Supports rapid containment through integrations with firewalls and NAC systems</p>
</li>
</ul>
<h3 data-start="4747" data-end="4797">Integration with Existing Hotel Security Stack</h3>
<p data-start="4799" data-end="4872"><a href="https://fidelissecurity.com/solutions/network-detection-and-response-ndr/" rel="nofollow"><strong>NDR Solutions</strong></a> is most effective when integrated with other security solutions like:</p>
<ul data-start="4874" data-end="5132">
<li data-start="4874" data-end="4973">
<p data-start="4876" data-end="4973"><strong data-start="4876" data-end="4928">Security Information and Event Management (SIEM)</strong>  for centralized visibility and correlation</p>
</li>
<li data-start="4974" data-end="5052">
<p data-start="4976" data-end="5052"><strong data-start="4976" data-end="5017">Endpoint Detection and Response (EDR)</strong>  to analyze device-level activity</p>
</li>
<li data-start="5053" data-end="5132">
<p data-start="5055" data-end="5132"><strong data-start="5055" data-end="5087">Firewall and IDS/IPS systems</strong>  for perimeter defense and rule enforcement</p>
</li>
</ul>
<p data-start="5134" data-end="5267">By feeding rich network metadata into SIEM platforms or collaborating with SOAR tools for automation, NDR becomes a force multiplier.</p>
<h3 data-start="5274" data-end="5309">Business Benefits for Hoteliers</h3>
<ul data-start="5311" data-end="5727">
<li data-start="5311" data-end="5392">
<p data-start="5313" data-end="5392"><strong data-start="5313" data-end="5337">Enhanced Guest Trust</strong>  Reassure guests that their data and devices are safe</p>
</li>
<li data-start="5393" data-end="5472">
<p data-start="5395" data-end="5472"><strong data-start="5395" data-end="5420">Regulatory Compliance</strong>  Meet data protection standards like PCI-DSS, GDPR</p>
</li>
<li data-start="5473" data-end="5554">
<p data-start="5475" data-end="5554"><strong data-start="5475" data-end="5497">Reduced Dwell Time</strong>  Spot and stop attackers before they can inflict damage</p>
</li>
<li data-start="5555" data-end="5645">
<p data-start="5557" data-end="5645"><strong data-start="5557" data-end="5583">Operational Continuity</strong>  Avoid disruptions to booking, check-in, and billing systems</p>
</li>
<li data-start="5646" data-end="5727">
<p data-start="5648" data-end="5727"><strong data-start="5648" data-end="5673">Reputation Management</strong>  Prevent breaches that could impact brand perception</p>
</li>
</ul>
<h3 data-start="5734" data-end="5786">Conclusion: NDR Is a Must-Have for Modern Hotels</h3>
<p data-start="5788" data-end="6110">As cyber threats targeting the hospitality sector continue to evolve, adopting NDR is no longer optionalits essential. From safeguarding guest Wi-Fi to protecting payment systems and IoT devices, NDR empowers hotels with the real-time visibility and rapid response capabilities needed to stay ahead of cyber adversaries.</p>
<p data-start="6112" data-end="6375">Investing in NDR not only enhances a hotels cybersecurity posture but also reinforces the trust of the modern, security-conscious traveler. In a world where digital experience is a key part of guest satisfaction, protecting your network is protecting your brand.</p>]]> </content:encoded>
</item>

<item>
<title>Key Metrics to Track in Your XDR Deployment</title>
<link>https://www.atlantanewsplus.com/key-metrics-to-track-in-your-xdr-deployment</link>
<guid>https://www.atlantanewsplus.com/key-metrics-to-track-in-your-xdr-deployment</guid>
<description><![CDATA[ As cyber threats grow more advanced and persistent, Extended Detection and Response (XDR) platforms have become a cornerstone of modern security operations. ]]></description>
<enclosure url="https://www.atlantanewsplus.com/uploads/images/202507/image_870x580_686b723e178e3.jpg" length="82623" type="image/jpeg"/>
<pubDate>Mon, 07 Jul 2025 13:07:52 +0600</pubDate>
<dc:creator>fidelissecurity</dc:creator>
<media:keywords>XDR, Extended Detection and Response, XDR Solutions, XDR platforms</media:keywords>
<content:encoded><![CDATA[<p data-start="141" data-end="580">As cyber threats grow more advanced and persistent, <a href="https://fidelissecurity.com/threatgeek/xdr-security/what-is-xdr-extended-detection-and-response/" rel="nofollow"><strong>Extended Detection and Response</strong></a> (XDR) platforms have become a cornerstone of modern security operations. XDR solutions unify data from endpoints, networks, servers, email, and cloud workloads to deliver centralized threat detection and response. However, deploying XDR is only half the battle  to measure its success and optimize performance, organizations must track the right metrics.</p>
<p data-start="582" data-end="750">In this article, well explore the key metrics you should monitor during and after your XDR deployment to ensure youre getting the most value from your investment.</p>
<h2 data-start="757" data-end="793">1.<strong data-start="763" data-end="793">Mean Time to Detect (MTTD)</strong></h2>
<p data-start="795" data-end="915"><strong data-start="795" data-end="809">Definition</strong>: The average time it takes for the XDR platform to identify a potential threat from the moment it occurs.</p>
<p data-start="917" data-end="1163"><strong data-start="917" data-end="935">Why It Matters</strong>: Fast detection is critical for minimizing the dwell time of attackers in your environment. A lower MTTD indicates that your XDR solution is effectively correlating data across sources and surfacing anomalies in near real-time.</p>
<p data-start="1165" data-end="1184"><strong data-start="1165" data-end="1183">How to Improve</strong>:</p>
<ul data-start="1185" data-end="1310">
<li data-start="1185" data-end="1233">
<p data-start="1187" data-end="1233">Enable behavioral analytics and AI/ML engines.</p>
</li>
<li data-start="1234" data-end="1262">
<p data-start="1236" data-end="1262">Fine-tune detection rules.</p>
</li>
<li data-start="1263" data-end="1310">
<p data-start="1265" data-end="1310">Integrate external threat intelligence feeds.</p>
</li>
</ul>
<h2 data-start="1317" data-end="1354">2.<strong data-start="1323" data-end="1354">Mean Time to Respond (MTTR)</strong></h2>
<p data-start="1356" data-end="1475"><strong data-start="1356" data-end="1370">Definition</strong>: The average time between detection of a threat and the initiation (or completion) of a response action.</p>
<p data-start="1477" data-end="1701"><strong data-start="1477" data-end="1495">Why It Matters</strong>: MTTR directly affects how much damage a cyberattack can inflict. Lower MTTR means your SOC team is able to take swift action, such as isolating endpoints, killing processes, or containing network traffic.</p>
<p data-start="1703" data-end="1722"><strong data-start="1703" data-end="1721">How to Improve</strong>:</p>
<ul data-start="1723" data-end="1864">
<li data-start="1723" data-end="1760">
<p data-start="1725" data-end="1760">Automate common response playbooks.</p>
</li>
<li data-start="1761" data-end="1809">
<p data-start="1763" data-end="1809">Use real-time alerts and guided investigation.</p>
</li>
<li data-start="1810" data-end="1864">
<p data-start="1812" data-end="1864">Streamline analyst workflows with SOAR integrations.</p>
</li>
</ul>
<h2 data-start="1871" data-end="1899">3.<strong data-start="1877" data-end="1899">Detection Coverage</strong></h2>
<p data-start="1901" data-end="2008"><strong data-start="1901" data-end="1915">Definition</strong>: The breadth of attack techniques and vectors that your <strong><a href="https://fidelissecurity.com/fidelis-elevate-extended-detection-and-response-xdr-platform/" rel="nofollow">XDR platform</a></strong> can monitor and detect.</p>
<p data-start="2010" data-end="2174"><strong data-start="2010" data-end="2028">Why It Matters</strong>: A high detection coverage across MITRE ATT&amp;CK techniques ensures a wider security posture, making it harder for adversaries to find blind spots.</p>
<p data-start="2176" data-end="2195"><strong data-start="2176" data-end="2194">How to Improve</strong>:</p>
<ul data-start="2196" data-end="2367">
<li data-start="2196" data-end="2233">
<p data-start="2198" data-end="2233">Regularly update detection content.</p>
</li>
<li data-start="2234" data-end="2306">
<p data-start="2236" data-end="2306">Expand telemetry collection from new sources (e.g., SaaS, containers).</p>
</li>
<li data-start="2307" data-end="2367">
<p data-start="2309" data-end="2367">Conduct threat emulation tests to evaluate detection gaps.</p>
</li>
</ul>
<h2 data-start="2374" data-end="2412">4.<strong data-start="2380" data-end="2412">Alert Volume and Noise Ratio</strong></h2>
<p data-start="2414" data-end="2505"><strong data-start="2414" data-end="2428">Definition</strong>: The number of alerts generated and the percentage that are false positives.</p>
<p data-start="2507" data-end="2720"><strong data-start="2507" data-end="2525">Why It Matters</strong>: Excessive false positives overwhelm analysts and lead to alert fatigue. Tracking this metric helps assess the signal-to-noise ratio of your XDR and whether its generating high-fidelity alerts.</p>
<p data-start="2722" data-end="2741"><strong data-start="2722" data-end="2740">How to Improve</strong>:</p>
<ul data-start="2742" data-end="2921">
<li data-start="2742" data-end="2792">
<p data-start="2744" data-end="2792">Implement contextual correlation across sources.</p>
</li>
<li data-start="2793" data-end="2858">
<p data-start="2795" data-end="2858">Train the platform using feedback loops from analyst responses.</p>
</li>
<li data-start="2859" data-end="2921">
<p data-start="2861" data-end="2921">Suppress redundant alerts with alert deduplication features.</p>
</li>
</ul>
<h2 data-start="2928" data-end="2964">5.<strong data-start="2934" data-end="2964">Analyst Efficiency Metrics</strong></h2>
<p data-start="2966" data-end="3100"><strong data-start="2966" data-end="2980">Definition</strong>: Measures such as time spent per investigation, number of incidents resolved per analyst, and time to escalate threats.</p>
<p data-start="3102" data-end="3268"><strong data-start="3102" data-end="3120">Why It Matters</strong>: Your XDR should improve the productivity of your security analysts. High efficiency indicates the platform is intuitive and reduces manual triage.</p>
<p data-start="3270" data-end="3289"><strong data-start="3270" data-end="3288">How to Improve</strong>:</p>
<ul data-start="3290" data-end="3440">
<li data-start="3290" data-end="3331">
<p data-start="3292" data-end="3331">Offer unified investigation workspaces.</p>
</li>
<li data-start="3332" data-end="3383">
<p data-start="3334" data-end="3383">Prioritize incidents with automated risk scoring.</p>
</li>
<li data-start="3384" data-end="3440">
<p data-start="3386" data-end="3440">Provide recommended actions and AI-generated insights.</p>
</li>
</ul>
<h2 data-start="3447" data-end="3480">6.<strong data-start="3453" data-end="3480">Automated Response Rate</strong></h2>
<p data-start="3482" data-end="3599"><strong data-start="3482" data-end="3496">Definition</strong>: The percentage of incidents that are remediated automatically through pre-defined rules or workflows.</p>
<p data-start="3601" data-end="3706"><strong data-start="3601" data-end="3619">Why It Matters</strong>: High automation reduces reliance on manual intervention and speeds up response times.</p>
<p data-start="3708" data-end="3727"><strong data-start="3708" data-end="3726">How to Improve</strong>:</p>
<ul data-start="3728" data-end="3950">
<li data-start="3728" data-end="3812">
<p data-start="3730" data-end="3812">Define playbooks for common threats (e.g., malware quarantine, credential resets).</p>
</li>
<li data-start="3813" data-end="3883">
<p data-start="3815" data-end="3883">Integrate with IAM, firewall, and endpoint tools to trigger actions.</p>
</li>
<li data-start="3884" data-end="3950">
<p data-start="3886" data-end="3950">Continuously refine automation logic based on incident feedback.</p>
</li>
</ul>
<h2 data-start="3957" data-end="3990">7.<strong data-start="3963" data-end="3990">Threat Containment Time</strong></h2>
<p data-start="3992" data-end="4124"><strong data-start="3992" data-end="4006">Definition</strong>: The time it takes to isolate a threat (e.g., blocking a malicious IP, quarantining an endpoint) after its detected.</p>
<p data-start="4126" data-end="4232"><strong data-start="4126" data-end="4144">Why It Matters</strong>: Speed of containment is crucial for preventing lateral movement and data exfiltration.</p>
<p data-start="4234" data-end="4253"><strong data-start="4234" data-end="4252">How to Improve</strong>:</p>
<ul data-start="4254" data-end="4419">
<li data-start="4254" data-end="4315">
<p data-start="4256" data-end="4315">Deploy endpoint and network-level containment capabilities.</p>
</li>
<li data-start="4316" data-end="4356">
<p data-start="4318" data-end="4356">Integrate automated containment rules.</p>
</li>
<li data-start="4357" data-end="4419">
<p data-start="4359" data-end="4419">Monitor performance of response actions across environments.</p>
</li>
</ul>
<h2 data-start="4426" data-end="4460">8.<strong data-start="4432" data-end="4460">Incident Escalation Rate</strong></h2>
<p data-start="4462" data-end="4576"><strong data-start="4462" data-end="4476">Definition</strong>: The percentage of alerts that require manual escalation to higher-tier analysts or threat hunters.</p>
<p data-start="4578" data-end="4779"><strong data-start="4578" data-end="4596">Why It Matters</strong>: A high escalation rate may suggest that detection rules lack precision or automation is insufficient, while a low rate (paired with good detection quality) reflects a mature system.</p>
<p data-start="4781" data-end="4800"><strong data-start="4781" data-end="4799">How to Improve</strong>:</p>
<ul data-start="4801" data-end="4962">
<li data-start="4801" data-end="4854">
<p data-start="4803" data-end="4854">Enable triage automation for low-complexity alerts.</p>
</li>
<li data-start="4855" data-end="4907">
<p data-start="4857" data-end="4907">Train the system using supervised learning models.</p>
</li>
<li data-start="4908" data-end="4962">
<p data-start="4910" data-end="4962">Provide clear alert context and root-cause analysis.</p>
</li>
</ul>
<h2 data-start="4969" data-end="5007">9.<strong data-start="4975" data-end="5007">Coverage Across Environments</strong></h2>
<p data-start="5009" data-end="5122"><strong data-start="5009" data-end="5023">Definition</strong>: Visibility and telemetry collection from cloud, on-prem, endpoint, SaaS, and hybrid environments.</p>
<p data-start="5124" data-end="5281"><strong data-start="5124" data-end="5142">Why It Matters</strong>: An XDR platform is only as good as the data it sees. Incomplete data sources limit detection accuracy and leave gaps in security posture.</p>
<p data-start="5283" data-end="5302"><strong data-start="5283" data-end="5301">How to Improve</strong>:</p>
<ul data-start="5303" data-end="5456">
<li data-start="5303" data-end="5352">
<p data-start="5305" data-end="5352">Expand data ingestion from all relevant assets.</p>
</li>
<li data-start="5353" data-end="5399">
<p data-start="5355" data-end="5399">Normalize logs across vendors and platforms.</p>
</li>
<li data-start="5400" data-end="5456">
<p data-start="5402" data-end="5456">Use agent-based and agentless approaches where needed.</p>
</li>
</ul>
<h2 data-start="5463" data-end="5497">10.<strong data-start="5470" data-end="5497">Cost Efficiency and ROI</strong></h2>
<p data-start="5499" data-end="5628"><strong data-start="5499" data-end="5513">Definition</strong>: The total cost of ownership (TCO) of your XDR deployment versus the measurable security and operational benefits.</p>
<p data-start="5630" data-end="5757"><strong data-start="5630" data-end="5648">Why It Matters</strong>: Demonstrating ROI helps justify continued investment and aligns security outcomes with business objectives.</p>
<p data-start="5759" data-end="5778"><strong data-start="5759" data-end="5777">How to Improve</strong>:</p>
<ul data-start="5779" data-end="5967">
<li data-start="5779" data-end="5834">
<p data-start="5781" data-end="5834">Track reductions in breach impact and recovery costs.</p>
</li>
<li data-start="5835" data-end="5909">
<p data-start="5837" data-end="5909">Calculate time saved through automation and fewer manual investigations.</p>
</li>
<li data-start="5910" data-end="5967">
<p data-start="5912" data-end="5967">Monitor improvements in compliance and audit-readiness.</p>
</li>
</ul>
<h2 data-start="5974" data-end="6010">Bonus: Compliance &amp; Audit Metrics</h2>
<p data-start="6012" data-end="6168">Some industries require proof of threat detection and incident response capabilities for regulatory compliance. Your XDR platform should help you report on:</p>
<ul data-start="6169" data-end="6273">
<li data-start="6169" data-end="6199">
<p data-start="6171" data-end="6199">Incident logs and timelines.</p>
</li>
<li data-start="6200" data-end="6234">
<p data-start="6202" data-end="6234">User and data access monitoring.</p>
</li>
<li data-start="6235" data-end="6273">
<p data-start="6237" data-end="6273">Retention of security event history.</p>
</li>
</ul>
<h2 data-start="6280" data-end="6293">Conclusion</h2>
<p data-start="6295" data-end="6684">Deploying an XDR platform is a significant step toward proactive and integrated threat defense  but without the right metrics, it's hard to gauge whether its delivering on its promise. By closely tracking key performance indicators like MTTD, MTTR, alert fidelity, and coverage, you can refine your deployment, reduce risk, and demonstrate tangible security improvements.</p>
<p data-start="6686" data-end="6887">As threats evolve, so too should your approach to measurement. Continuously evaluate and optimize your XDR metrics to ensure your organization remains resilient in the face of modern cyber adversaries.</p>]]> </content:encoded>
</item>

</channel>
</rss>