#BENVLOG: With Threat Hunting, It’s Time to Get Creative

By: June 18, 2015
benblog

“Hunting” is popping up as a common theme in conversations with security leaders. As Ben Johnson notes, these leaders should be letting their teams get creative when it comes to hunting threats.

Risk Recon: Navigating Security and Risk

By: June 17, 2015
roads

(Editor’s note: This blog appears as part of the eBook, “Should You Buy Endpoint Security from a Network Security Vendor?” available here.) By David Monahan, Research Director, Security & Risk Management Enterprise Management Associates (EMA) As I was analyzing the Data-Driven Security Reloaded… Read More

Partners Using Carbon Black: Combing Through Endpoint Data to Detect Threats

By: June 16, 2015
redcanary

(Editor’s note: This post originally appeared on Red Canary’s website. Red Canary is a Bit9 + Carbon Black partner. To learn more about our partnerships, click here.) By Keith McCammon, Red Canary I’m always combing through detections that we produce… Read More

WS2K3 Deadline: “Winter is Coming” (No Spoilers!)

By: June 15, 2015
winter

Winter is coming. I’m sorry, I’m just a little excited after last night’s season finale to “Game of Thrones.” I assure you, there are no episode or season spoilers in this blog post. But, wow! What a shocker! Who would… Read More

#BENVLOG: Automation Becoming a Key Infosec Wishlist Item for Security Teams

By: June 11, 2015
benblog

In his latest video blog, this time from SFO, Bit9 + Carbon Black Chief Security Strategist Ben Johnson discusses the importance of automation in certain security processes and notes how such automation is creeping to the top of the “must… Read More

Time To Call in the Specialists: Network and Endpoint Security Require Different Approaches

By: June 10, 2015
chess1

(Editor’s note: This blog appears as part of the eBook, “Should You Buy Endpoint Security from a Network Security Vendor?” available here.) By Fran Howarth, Senior analyst, security, Bloor Research In recent years, there has been much consolidation in the security market as… Read More