Cisco Launches Managed Threat Defense Service
Posted on: 22 Apr 2014
The very best security teams I have worked with engage in continuous network monitoring and analysis. They capture downloaded executables and detonate them in sandboxed environments to extract key indicators…
Security Analytics: Essential Cyber Defense Capability
Posted on: 22 Apr 2014
This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…
Ponemon Survey Reveals Lack of Incident Response Maturity
Posted on: 21 Apr 2014
This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…
Crafting an Insider Threat Strategy
Posted on: 19 Apr 2014
This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…
Use Marty Roesch’s BDA to Keep BAD Things from Happening
Posted on: 18 Apr 2014
This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…
Reducing Time-to-Resolution With Network Analytics
Posted on: 18 Apr 2014
This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…
Commtouch Pivots to a Product Vendor as Cyren
Posted on: 18 Apr 2014
This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…
Was the Heartbleed Bug Disclosed Responsibly?
Posted on: 16 Apr 2014
Responsible disclosure is a burning issue it the world of software and security. If a security flaw is discovered by a researcher (sometimes called a hacker) what are the responsible…
Cyphort Adding Context to Advanced Malware Detection
Posted on: 15 Apr 2014
This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…
Evidence Appearing That NSA Knew About Heartbleed
Posted on: 11 Apr 2014
While Bruce Schneier may have been jumping to conclusions when he said: “At this point, the probability is close to one that every target has had its private keys extracted…