2015 CrowdStrike Global Threat Report Preview
With every year that passes, the stakes for connecting a business to the Internet dramatically increase. In 2013, the use of Point…
With every year that passes, the stakes for connecting a business to the Internet dramatically increase. In 2013, the use of Point…
In 2014 it became abundantly clear that threat intelligence provides a decisive advantage in protecting your enterprise. Using threat intelligence, savvy security…
“I’m drowning in data, but starving for information.” Ever feel that way? Recently, I heard a CISO use this as a description…
With high profile breaches in the financial, healthcare and retail sectors making news almost daily, it’s no secret that those industries are…
After the better part of a decade chasing adversaries around the Internet, there are a few things I know to be true…
Forewarned is forearmed, and nowhere is this sentiment more true than in the field of cybersecurity. When George Kurtz and his team…
On November 5, 2013, Microsoft announced that a vulnerability in the Microsoft Graphics Component could allow Remote Code Execution (RCE). This announcement attracted immediate…
As the situation on the ground in Syria continues to deteriorate, the Syrian Electronic Army (SEA) has made quite a few waves…
This year at Black Hat, I’ll be teaching a new class as a follow-on to my popular Cyber Defense Bootcamp class. During…