“Hunting” is popping up as a common theme in conversations with security leaders. As Ben Johnson notes, these leaders should be letting their teams get creative when it comes to hunting threats.
(Editor’s note: This blog appears as part of the eBook, “Should You Buy Endpoint Security from a Network Security Vendor?” available here.) By David Monahan, Research Director, Security & Risk Management Enterprise Management Associates (EMA) As I was analyzing the Data-Driven Security Reloaded… Read More
(Editor’s note: This post originally appeared on Red Canary’s website. Red Canary is a Bit9 + Carbon Black partner. To learn more about our partnerships, click here.) By Keith McCammon, Red Canary I’m always combing through detections that we produce… Read More
Winter is coming. I’m sorry, I’m just a little excited after last night’s season finale to “Game of Thrones.” I assure you, there are no episode or season spoilers in this blog post. But, wow! What a shocker! Who would… Read More
In his latest video blog, this time from SFO, Bit9 + Carbon Black Chief Security Strategist Ben Johnson discusses the importance of automation in certain security processes and notes how such automation is creeping to the top of the “must… Read More
(Editor’s note: This blog appears as part of the eBook, “Should You Buy Endpoint Security from a Network Security Vendor?” available here.) By Fran Howarth, Senior analyst, security, Bloor Research In recent years, there has been much consolidation in the security market as… Read More