Moving beyond Indicators of Compromise (IOCs)
For the last few years, the security industry has become very enamored with Indicators of Compromise (IOCs) as a way to detect targeted…
For the last few years, the security industry has become very enamored with Indicators of Compromise (IOCs) as a way to detect targeted…
Read Video Transcript All too often, I hear from executives of large and small organizations that aside from targeted attacks, impact from…
Most companies tend to think of intrusions as discrete and infrequent events. The narrative often goes like this: a company gets breached,…
A malware-centric strategy is mere child's play against today's sophisticated adversaries. Here's why. Most organizations today focus on protecting their networks against…
I am always looking forward to attending the annual RSA Conference. This year, we are particularly excited as our team of experts…
Update: Here is the link the White House announcement of the Executive Order For the last 4 years, I have persistently advocated for a trade…
In February 2014 at the RSA Conference, my colleague George Kurtz and I presented a session titled “Hacking Exposed: Day of Destruction.”…
There is a curse that is purported to translate to an old Chinese Proverb - “May you live in interesting times.” These…
‘Tis the season for trick-or-treating, so I thought it might be a good time to share some of the new tricks we’re…
Every once in a while an adversary does something unique or interesting that really captures our attention. The majority of the remote…