Modern Security Requires an Active Mindset

By: April 22, 2015

There are two kinds of people I encounter during my presentations about the Bit9 Security Platform to prospective customers: Reactive Navigation Mode (Operational): In this line of thinking, a prospective customer reacts to my presentation by thinking: “Oh no! More… Read More

Ben Johnson Keynotes BSidesIOWA 2015 with “The New Buzzwords that Matter”

By: April 22, 2015

Recently the good guys putting together BSidesIOWA reached out and asked if I would come kick things off.  This was the perfect opportunity to mold some of my blog and discussion topics into a presentation.  The turnout, Q & A… Read More

Real World Incident Response: Defusing a Phishing Attack in Less Than 5 Minutes

By: April 21, 2015

By Sarah Miller and Dan Wodeyla One of the things we at Bit9 + Carbon Black like to tell customers is that we “eat our own dog food.” That means the tools and integrations we sell are used in-house by… Read More

As Integrations Reign Supreme at RSA, Bit9 + Carbon Black Helps Strengthen the ‘Security Chain’

By: April 20, 2015

As Jon Oltsik notes in his latest blog for Enterprise Strategy Group, “the cybersecurity chain is only as strong as its weakest link.” We couldn’t agree more. The entire security “chain” must be powerful—at every link. In his post, Jon… Read More

2015 RSA Expo Survival Guide

By: April 20, 2015

As a security professional, this is one of the most exciting times of the year. This week, the RSA Conference convenes in San Francisco. It’s one of the biggest events for our industry. I have attended the conference for more… Read More

How to Thwart a Social Engineering Attack Using Trusted Icon Recognition

By: April 17, 2015

One of the most popular attack techniques used today is social engineering, most often via emails that convince a user to run an executable. For attackers, there are two critical components to making social engineering successful: The situation described convinces… Read More