Malicious File Transfer: What You Need To Know About an Attacker’s Methods and Techniques To Protect Your Organization From Malware by Ursula Cowan

Malicious File Transfer: What You Need To Know About an Attacker’s Methods and Techniques To Protect Your Organization From Malware by Ursula Cowan

|
One of the most effective ways for threat actors to infiltrate a network’s defenses is through the use of malware. There are a few main ways that malware enters a network: malicious websites, social engineering, insider threat, and phishing ... Read More
Verodin LATAM Party (Porto Alegre Brazil) by Brian Contos

Verodin LATAM Party (Porto Alegre Brazil) by Brian Contos

|
Friday night we had an awesome time at the Dublin Irish Pub in Porto Alegre Brazil. The Youngles performed and played music ranging from Elvis and Rolling Stones to R.E.M. and U2 ... Read More
Policy Evasion: Evasive Techniques You Need to Understand to Prevent Breaches and Attacks by Major General Earl Matthews USAF (Ret)

Policy Evasion: Evasive Techniques You Need to Understand to Prevent Breaches and Attacks by Major General Earl Matthews USAF (Ret)

|
Think like a threat actor. Only then can countermeasures be implemented that are the most effective and relevant to each environment ... Read More
Measuring Security Effectiveness: Infiltrations and Ransomware by Tracey Moon

Measuring Security Effectiveness: Infiltrations and Ransomware by Tracey Moon

|
Attackers have many ways to infiltrate a network, and security teams typically see only approximately one-third of those attacks ... Read More
Intelligently Test Against MITRE ATT&CK Framework To Know What’s Most Relevant to Your Organization by Lynn Harrington

Intelligently Test Against MITRE ATT&CK Framework To Know What’s Most Relevant to Your Organization by Lynn Harrington

|
An easy to implement platform featuring timely threat intelligence makes it possible for more organizations to be able to optimize the use of MITRE ATT&CK™ ... Read More
Mandiant Security Validation Offers Automated Evaluation of Security Controls Against MITRE ATT&CK Framework by Lynn Harrington

Mandiant Security Validation Offers Automated Evaluation of Security Controls Against MITRE ATT&CK Framework by Lynn Harrington

|
Organizations with a continuous controls validation technology aligned with MITRE ATT&CK can accelerate improvements to their detection and prevention capabilities in a safe, effective, repeatable and measurable way ... Read More
Verodin Thanksgiving Event – Guns 'N' Roses – Oracle Arena, Oakland by Brian Contos

Verodin Thanksgiving Event – Guns ‘N’ Roses – Oracle Arena, Oakland by Brian Contos

|
Yesterday we had a pre-Thanksgiving celebration Verodin style in Oakland CA at the Guns N’ Roses “Not in this Lifetime” tour. It was great getting the Verodin team together with friends from Google and other Silicon Valley companies last night to celebrate an absolutely awesome 2017 at Verodin ... Read More
Mandiant Security Effectiveness Report 2020: What You Need to Know NOW About Reconnaissance by Major General Earl Matthews USAF (Ret)

Mandiant Security Effectiveness Report 2020: What You Need to Know NOW About Reconnaissance by Major General Earl Matthews USAF (Ret)

|
In order to protect an organization’s business critical assets, security teams need to think like a cyber adversary, because only by understanding their process can an organization be prepared and prevent an attack or breach before it happens. And the first step is understanding reconnaissance ... Read More
Perception v. Reality: Most Companies are Incorrectly Assuming That They are Alerting, Preventing and Blocking Attacks by Major General Earl Matthews USAF (Ret)

Perception v. Reality: Most Companies are Incorrectly Assuming That They are Alerting, Preventing and Blocking Attacks by Major General Earl Matthews USAF (Ret)

|
Security leaders may assume that they are protected when they're not. They may think they haven't been breached, but they have ... Read More
Paradigm Shift: Mandiant Security Instrumentation Platform and Threat Actor Assurance Module Enable Organizations to Get the Right Data for Cyber Readiness by Lynn Harrington

Paradigm Shift: Mandiant Security Instrumentation Platform and Threat Actor Assurance Module Enable Organizations to Get the Right Data for Cyber Readiness by Lynn Harrington

|
A lot of cyber threat intelligence is not actually intelligence but just information. Often incomplete and difficult to act on ... Read More