Developer Relations Month: Detecting Data Exfiltration via DNS Queries

By: November 24, 2015

I spend a lot of my time using Carbon Black to look for post-exploit activities. The attackers are far better at finding vulnerabilities and creating exploits than I’ll ever be. The good news is that I know exactly what my… Read More

#BENVLOG: “I Want YOU for Cyber Security’

By: November 20, 2015

In today’s edition of Ben Johnson’s video blog, Ben discusses the need for more talent in the information security industry.

Video Presentation: Visualizing Security Data at Scale

By: November 19, 2015

For years, adversaries took advantage of organizations’ reluctance to talk about defensive security techniques, meaning everyone was trying to solve the same problems on their own. But now the security industry is moving toward more openness and collaboration in threat… Read More

Defining “In-Memory Attacks” Is More than Just an Issue of Semantics

By: November 17, 2015

Perhaps some of you have noticed how crafty I am with my words.  Yes, I like to wordsmith and spin; it’s sort of a hobby of mine. I notice when others are crafty, too.  Which leads me to today’s advice: … Read More

Developer Relations Month: 3 Key Trends from the 2015 User Xchange

By: November 12, 2015

Last month nearly 200 Bit9 + Carbon Black customers and partners from around the world gathered in Las Vegas for the 2015 User Xchange. The event was just that; an exchange of knowledge from some of the biggest experts in… Read More

NIST Touts Efficacy of Application Whitelisting for Preventing Intrusions, Malware

By: November 11, 2015

In its recently published Guide to Application Whitelisting, the National Institute of Standards and Technology (NIST) of the U.S. Department of Commerce, offered guidance on how to prevent intrusions and malware by using application whitelisting. NIST advises organizations “to use… Read More