Jeremiah Cruit on Compliance vs. Security

Marriott’s Costly Mistake: Letting Compliance Trump Security

Friday’s news of Marriott’s massive breach sent shock waves throughout the cybersecurity industry and consumer sectors alike. Brian Krebs described the “colossal intrusion” and numerous other security experts joined in to analyze ...
What's New in Bromium Secure Platform, Version 4.1 Update 4

Bromium Secure Platform 4.1.4 Adds Threat Intelligence, Firefox Browsing, and More

Leverage Bromium Threat Cloud intelligence for real-time malware family and severity classifications Enjoy safe native browsing using Mozilla Firefox with risky sites isolated in Bromium Secure Browser Securely isolate the latest versions ...
pyramid of pain

Hash Hunting: Why File Hashes are Still Important

According to Gartner, threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable intelligence. When security research teams or government agencies release threat intelligence reports, some of the more tactical ...

Threat Hunting and EPP – More Important Now than Ever

Sometimes I make a lofty statement and need to defend it. This time I thought it should become a blog post. Below I offer three reasons that Endpoint Protection and Threat Hunting ...
Human vs Machine: Why Machine Learning Won't Replace Threat Hunters (Yet)

Human vs Machine: Why Machine Learning Won’t Replace Threat Hunters (Yet)

Mathematicians and marketing people alike would have us believe that Machine Learning is soon to replace all our human undertakings. While the automation opportunities afforded by Machine Learning will surely replace some ...

Building Enterprise-Class Threat Intelligence

| | Threat Intelligence
The ever-expanding range and diversity of cyber threats make it difficult for organizations to prioritize their offensive and defensive strategies against attackers. From malware, ransomware, and other attacks coming from the outside, ...
Using Android Proxy Browsers - Convenience without Web Application Security

Using Android Proxy Browsers – Convenience without Web Application Security

Slow. Antiquated. Android. Remember the old Android device you used to use? Many of us have old versions of these devices sitting around that worked well 5 or 6 years ago, but ...
AI/ML for Threat Intelligence

3 Reasons Why Companies Are Adopting AI/ML for Threat Intelligence

AI and ML increasingly are being considered in security solutions as a real value-add There are potential dangers lurking behind every digital corner and, increasingly, each threat becoming more sophisticated and difficult ...
Security Boulevard

Was The Crystal Ball Crystal Clear? Reflecting on 2018 Cybersecurity Predictions

We’re halfway through 2018 and several cybersecurity predictions made in late 2017 have, unfortunately, already come true. From cryptojackers becoming an actual threat to organizations instead of just a nuisance for end ...
Loading...