5 Ways to Make Information Sharing Programs More Successful

By: May 20, 2015
sharing

Threat intelligence and information sharing are critical ingredients to improving the cyber-security posture of both the private and public sectors. It is clear from the volume, sophistication and diversity of the cyber attacks we are seeing that the “bad guys”… Read More

It’s Time to Reimagine Incident Response

By: May 18, 2015
reimagine

Incident response is not about NIST 800-61’s governance-focused “Incident Response Process.” It’s about bytes over the wire, hands on keyboard, tactical steps that responders use during an investigation. As information security programs embrace detection and response, they are building repeatable… Read More

Top 10 Blogs of 2015…So Far

By: May 15, 2015
blogs2

We’ve seen incredible traffic to the Bit9 + Carbon Black Blog in 2015. Thanks for reading! Click the image below to open a countdown of the top 10 blogs of 2015, so far. What has been the most popular topic?… Read More

#BENBLOG: ‘Tailored Attacks Require Tailored Defenses’

By: May 13, 2015
benblog

Keeping an Eye on Icons: Seeing Beyond the Byte

By: May 12, 2015
iconlead

Digital image processing has constantly evolved since its inception more than half a century ago. From Lawrence Roberts’ seminal thesis on machine perception to modern-day robotic vision, numerous techniques have been developed, each tailored to the challenges of a particular application…. Read More

As End-of-Life Deadlines Near, Threat Mitigation Takes on Increased Importance

By: May 11, 2015
xp1

More than a year after Microsoft ended extended support for Windows XP, 44 percent of enterprises are still using the operating system, according to our recent survey. In the survey, we polled IT leaders at 500 medium and large enterprises… Read More