FFIEC Cyber Security Assessment Tool Helps Finance Industry Understand Their Risks

By: July 30, 2015
tool

As of July 1, the Federal Financial Institutions Examination Council (FFIEC), in conjunction with the National Institute Standards of Technology (NIST), developed the Cybersecurity Assessment Tool to help financial institutions identify their risks and determine their cybersecurity preparedness. Banks can… Read More

The Carbon Black API: From Product to Platform

By: July 29, 2015
APIs

The core strength of Carbon Black is its always-on recording of activity from all monitored endpoints. This, of course, generates a vast amount of data, which the Carbon Black server does a very good job visualizing in its user interface…. Read More

Tech Tuesday: Carbon Black Integration with iSIGHT Partners for Enhanced Detection & Response

By: July 28, 2015
isight

Carbon Black is the industry’s leading endpoint threat detection and response solution. To enhance Carbon Black’s detection and response capabilities, Carbon Black pulls in threat intelligence from the Bit9 + Carbon Black Threat Intelligence Cloud, which offers comprehensive advanced threat… Read More

To Secure Your Community, It’s Time to Call Out the “Busters”

By: July 27, 2015
community

The Different Drum, by M. Scott Peck, is a book about how you build a robust “community.” “Community” as defined by the book means ” a group of people committed to some goal or purpose.” Commitment is absolutely key in… Read More

Using Bit9 to Mitigate MS15-078/CVE-2015-2426

By: July 24, 2015
vulnerable

As the fallout from The Hacking Team compromise continues, another zero-day in their possession has come to light. This one consists of a kernel vulnerability that not only provides privilege escalation, but also remote code execution. It’s serious enough that… Read More

As Car Hacking Becomes ‘A Thing’ It’s on Automakers to Protect Critical Auto Functions

By: July 23, 2015
carhack

This week, we saw an article talking about the latest proof of concept for remotely controlling automobiles. Hacking cars, you mean?! Yes, and this shouldn’t be terribly surprising. Cars are full of computers. The article discusses how automakers are trying… Read More