Using Carbon Black to Detect CVE-2015-1130 on Mac OS X Endpoints

By: April 10, 2015
rcfull

(Editor’s Note: This post originally appeared on RedCanary.co. Red Canary is a Bit9 + Carbon Black partner and uses Carbon Black software extensively in its threat detection and response services.) By Jason Garman, Research and Development / Co-Founder, Red Canary Security… Read More

After Airport Breaches, Prevention, Detection and Response Enter the Spotlight

By: April 10, 2015
airport1

According to an Associated Press investigation, it appears that many major U.S. airports have experienced a disturbing number of perimeter breaches over the past decade. “Perimeter breach” means that an unauthorized person was found walking around on the tarmac, maybe… Read More

“Ultimate Windows Security” Guru Randy Franklin Smith Reviews Bit9 + Carbon Black SCEP, EMET Integrations

By: April 9, 2015
RFSwin

(Editor’s Note: This post originally appeared on UltimateWindowsSecurity.com) By Randy Franklin Smith, Windows Security Subject Matter Expert If I were to lose sleep about technology risks it would be about endpoint security. Endpoint security is probably every organization’s biggest risk… Read More

‘Cyber Crime-tivisim’ May Be the New Evolution of Attack

By: April 8, 2015
cybercrime

The recent FBI reports on ISIS sympathizers conducting Web-defacement campaigns, and groups setting up fraudulent government-service websites beg the question: “Are hactivists and cyber criminals working together?” It makes sense, doesn’t it? Militaries have propaganda and disruptive arms and operations,… Read More

When Your Garage is a Mess, It’s Time for a Spring Cleaning

By: April 7, 2015
garagelead

At a recent meeting with a prospective customer, the organization’s CISO began by stating that her garage was a mess. She was expressing a metaphor relating to her company’s software inventory. Specifically, she stated: “I don’t fully know what’s running… Read More

The “Romance” of Hacking is all in the Dirty Details

By: April 6, 2015
eye1

In my last post, I wrote about how well-crafted APTs are like well-crafted love letters, and how the human element is what makes them so dangerous. I also promised some real-world examples. The incidents below are not unlike incidents that… Read More