Partners Using Carbon Black: Seeing Cross-Process Events to Detect Threats

By: May 27, 2015
redcanary

By Jason Garman, Red Canary (Editor’s note: This post originally appeared on Red Canary’s website. Red Canary is a Bit9 + Carbon Black partner. To learn more about our partnerships, click here.) Red Canary’s threat detection has historically leveraged five… Read More

#BENBLOG: ‘Every Piece of Data is a Liability’

By: May 26, 2015
benblog

In this week’s edition of #BENBLOG, Ben Johnson asks some important questions about data security: “Do you know WHAT you are storing?” “Do you know WHERE you are storing it?” and, perhaps most importantly: “Do you know WHY you are… Read More

Bit9 + Carbon Black Partner Post: Preparing for a United Defense through Intelligence Sharing

By: May 22, 2015
lastline_logo

By Jason Landers, Senior Sales Engineer, Lastline Modern threat actors are creative, persistent and funded. Yet, despite the severity of the threats, the majority of companies have been defending themselves in isolation. Where have we seen examples of this in… Read More

Latest Major Healthcare Breach Highlights the Need for More “Community” in Information Security

By: May 21, 2015
cfbb

In what has become the third major healthcare insurance breach in the United States this year, CareFirst, a Blue Cross Blue Shield plan, revealed that hackers attacked its computer systems potentially affecting 1.1 million customers. According to CareFirst, hackers gained… Read More

Partners Using Carbon Black: Responding to an Endpoint Threat in 90 Seconds

By: May 21, 2015
rcclead

By Chris Rothe, Red Canary (Editor’s note: This post originally appeared on Red Canary’s website. Red Canary is a Bit9 + Carbon Black partner. To learn more about our partnerships, click here.) At Red Canary, we’re always looking to simplify… Read More

5 Ways to Make Information Sharing Programs More Successful

By: May 20, 2015
sharing

Threat intelligence and information sharing are critical ingredients to improving the cyber-security posture of both the private and public sectors. It is clear from the volume, sophistication and diversity of the cyber attacks we are seeing that the “bad guys”… Read More