Top 10 Blogs of 2015…So Far

By: May 15, 2015
blogs2

We’ve seen incredible traffic to the Bit9 + Carbon Black Blog in 2015. Thanks for reading! Click the image below to open a countdown of the top 10 blogs of 2015, so far. What has been the most popular topic?… Read More

#BENBLOG: ‘Tailored Attacks Require Tailored Defenses’

By: May 13, 2015
benblog

Keeping an Eye on Icons: Seeing Beyond the Byte

By: May 12, 2015
iconlead

Digital image processing has constantly evolved since its inception more than half a century ago. From Lawrence Roberts’ seminal thesis on machine perception to modern-day robotic vision, numerous techniques have been developed, each tailored to the challenges of a particular application…. Read More

As End-of-Life Deadlines Near, Threat Mitigation Takes on Increased Importance

By: May 11, 2015
xp1

More than a year after Microsoft ended extended support for Windows XP, 44 percent of enterprises are still using the operating system, according to our recent survey. In the survey, we polled IT leaders at 500 medium and large enterprises… Read More

Criminal Attacks Surpass Employee Negligence for Data Breaches at Healthcare Orgs.

By: May 7, 2015
healthcaretarget

It’s no secret that the healthcare industry has seen a surge in data breaches and security incidents in recent months and years. Healthcare records typically carry a premium on the black market and, generally speaking, healthcare organizations have been lagging… Read More

CTO Corner: 3 Mobile Threats to Keep on Your Radar

By: May 6, 2015
mobiles

Last week, my colleague Chris Lord offered an excellent look at some of the mobile trends seen at this year’s RSAC. As he noted, the increased prevalence and creation of apps and mobile malware as well as changes to the… Read More