“You Want Me to Do What?” A Guide to Interpreting Cybersecurity Recommendations
Congratulations! You’ve reached the end of yet another proactive engagement with a security services provider. Now that the engagement is…
Top 5 Cybersecurity Mistakes Companies Make and How to Avoid Them
Cybersecurity requires a holistic organizational approach. From the leadership to each rank-and-file employee, a concerted effort must be maintained to…
Nothing else is working. Why not memory forensics?
I ran across a couple of blog posts recently that were espousing the virtues of memory forensics. Having developed a…
Sakula Reloaded
Often during the investigation of sophisticated threat actors, the demarcation between the different attackers and campaigns are blurry. Researchers need…
How to Learn from Adversaries as they Test Attack Strategies
According to a recent Harvard Business Review report, 84 percent of enterprises have increased their Cloud usage in the past…
5 Reasons Endpoint Security Must Move To The Cloud
As organizations grow and become more distributed, adding more endpoints across the enterprise, sophisticated adversaries will continue to aggressively target…
Blurring of Commodity and Targeted Attack Malware
As malware and its authors continue to evolve, deciphering the purpose of specific malware-driven attacks has become more challenging. While…
Adjust Your Priorities for Risk-Centric Asset Management
This is the first in a recurring series that explores the functions, categories and subcategories of the National Institute of…
Should I Really Trust the Cloud with my Endpoint Protection?
The radical shift in the scale and economics of cybercrime calls for an equally radical change in how IT protects user…
U.S. – China Cyber Agreement: Trust, but Verify
The joint U.S.-China cyber agreement announced today represents the next iteration of the ongoing cyber security saga between two world…