Carbon Black 5.0 Changes the Endpoint Security Game with Live Response

By: January 27, 2015

Today, we announced the immediate availability of Carbon Black 5.0. As we have now heard several times from our early access customers, Carbon Black 5.0 is a “game changer.” Why? Let’s dive in and see. The root problem in cyber… Read More

Kinetic Playground: When Cyber Attacks Become Real

By: January 26, 2015

It is a rare occurrence when a cyber-attack impacts something in the material world. In fact, it is so rare that it has only been publicly acknowledged twice in the last five years. The first time being the direct result… Read More

NSA Best Practices Now Include Application Whitelisting

By: January 26, 2015

The Information Assurance Directorate of the National Security Agency/Central Security Service recently released a new document titled Defensive Best Practices For Destructive Malware. The document clearly states a concise overall strategy for preventing malware: “Prevent, Detect, and Contain.” Forgive my… Read More

As Obama Brings Cyber Security to Center Stage, 2 Key Issues Need to Be Addressed

By: January 23, 2015

“If we don’t act, we’ll leave our nation and our economy vulnerable” – President Obama. In case you missed it, that’s President Obama calling out cyber security at this week’s State of the Union address. Wow! For anyone working in… Read More

Security Zen: The Path to Security Isn’t Always Black and White

By: January 22, 2015

Please don’t tell anyone, but on some systems I used to administer a long time ago, I let “warez dudez” hang out on a couple of my file servers. (No, I did not use any of their warez.) This was… Read More

Following Poweliks Strike, Custom Bit9 Rule Offers Key Insight and Blocks Infection

By: January 21, 2015

I love to hear stories about how our customers use our products. I previously wrote about a global services firm that used Bit9 to connect the dots to get to the bottom of an Internet Explorer exploit. This same company… Read More