With the “Zen of Security,” It’s all about the Journey

By: January 29, 2015

“It’s all about the journey.” I know, how many times have you heard that one, right? That quote embodies the essence of “Zen,” perhaps more than any other. Let’s talk about that journey today in the context of security processes…. Read More

90% of Security Could be Fixed by IT

By: January 28, 2015

Anton Chuvakin posted a great LinkedIn Pulse article today discussing, what he said, is too much focus on defending against the APT. In the article “Defeat the Casual Attacker First!!!” Anton wrote: “Focus on improving your security maturity—not on randomly… Read More

Screenshot Demo: Carbon Black “Live Response” in Action

By: January 28, 2015

For a long time, security professionals over invested in “set-it-and-forget-it” detection capabilities like antivirus. We’ve since wised up and moved on to detection, detection, and more detection, but as a result, we started to drown in a  sea of alerts…. Read More

Carbon Black 5.0 Changes the Endpoint Security Game with Live Response

By: January 27, 2015

Today, we announced the immediate availability of Carbon Black 5.0. As we have now heard several times from our early access customers, Carbon Black 5.0 is a “game changer.” Why? Let’s dive in and see. The root problem in cyber… Read More

Kinetic Playground: When Cyber Attacks Become Real

By: January 26, 2015

It is a rare occurrence when a cyber-attack impacts something in the material world. In fact, it is so rare that it has only been publicly acknowledged twice in the last five years. The first time being the direct result… Read More

NSA Best Practices Now Include Application Whitelisting

By: January 26, 2015

The Information Assurance Directorate of the National Security Agency/Central Security Service recently released a new document titled Defensive Best Practices For Destructive Malware. The document clearly states a concise overall strategy for preventing malware: “Prevent, Detect, and Contain.” Forgive my… Read More