Richard Stiennon

Chief Research Analyst

IT-Harvest


Cisco Launches Managed Threat Defense Service

Posted on: 22 Apr 2014

The very best security teams I have worked with engage in continuous network monitoring and analysis. They capture downloaded executables and detonate them in sandboxed environments to extract key indicators…

Security Analytics: Essential Cyber Defense Capability

Posted on: 22 Apr 2014

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…

Ponemon Survey Reveals Lack of Incident Response Maturity

Posted on: 21 Apr 2014

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…

Crafting an Insider Threat Strategy

Posted on: 19 Apr 2014

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…

Use Marty Roesch’s BDA to Keep BAD Things from Happening

Posted on: 18 Apr 2014

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…

Reducing Time-to-Resolution With Network Analytics

Posted on: 18 Apr 2014

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…

Commtouch Pivots to a Product Vendor as Cyren

Posted on: 18 Apr 2014

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…

Was the Heartbleed Bug Disclosed Responsibly?

Posted on: 16 Apr 2014

Responsible disclosure is a burning issue it the world of software and security. If a security flaw is discovered by  a researcher (sometimes called a hacker) what are the responsible…

Cyphort Adding Context to Advanced Malware Detection

Posted on: 15 Apr 2014

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…

Evidence Appearing That NSA Knew About Heartbleed

Posted on: 11 Apr 2014

While Bruce Schneier may have been jumping to conclusions when he said: “At this point, the probability is close to one that every target has had its private keys extracted…