I spend a lot of my time using Carbon Black to look for post-exploit activities. The attackers are far better at finding vulnerabilities and creating exploits than I’ll ever be. The good news is that I know exactly what my… Read More
In today’s edition of Ben Johnson’s video blog, Ben discusses the need for more talent in the information security industry.
For years, adversaries took advantage of organizations’ reluctance to talk about defensive security techniques, meaning everyone was trying to solve the same problems on their own. But now the security industry is moving toward more openness and collaboration in threat… Read More
Perhaps some of you have noticed how crafty I am with my words. Yes, I like to wordsmith and spin; it’s sort of a hobby of mine. I notice when others are crafty, too. Which leads me to today’s advice: … Read More
Last month nearly 200 Bit9 + Carbon Black customers and partners from around the world gathered in Las Vegas for the 2015 User Xchange. The event was just that; an exchange of knowledge from some of the biggest experts in… Read More
In its recently published Guide to Application Whitelisting, the National Institute of Standards and Technology (NIST) of the U.S. Department of Commerce, offered guidance on how to prevent intrusions and malware by using application whitelisting. NIST advises organizations “to use… Read More