May 23, 2018
Footer background image

Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Defending your organization from cyber-attacks is a daunting challenge when the economics of cybersecurity favors the attacker. For an organization, success means thwarting each and every attack attempt while the attacker only needs one win. The money and data obtained from a breach is valued at only a fraction of the cost that your organization […]

Read more >
April 30, 2018
Footer background image

Why Cyber Response Mechanisms Must Talk to Each Other… part 2

In part 1 of this blog series I highlighted why organizations require independent cyber security systems that can be combined in a collaborative manner to provide more effective threat response. In this week’s final installment of the series, I will answer a key question: How do organizations ensure they are either developing or leveraging technologies […]

Read more >
April 05, 2018
Footer background image

DDE Exploitation – Macros Aren’t the Only Thing You Should be Counting

Exploitation of the Microsoft® Dynamic Data Exchange (DDE) protocol is increasingly being used to launch malicious code in weaponized email attachments. A native feature in Microsoft, DDE allows data to be pulled from other sources, such as updating a spreadsheet from an external database. As with many features, DDE can be leveraged for malicious purposes. […]

Read more >
March 22, 2018

Camouflage & Deception: A New Approach to Threat Mitigation

Organizations are faced with threats that range from annoyances to more sophisticated threats crafted by an adversary with intention and forethought on their objectives. The prevalence of exploit kits and malware and botnet toolkits being shared by bad actors across the Internet and Dark Net makes it easier for actors to build more sophisticated threats. […]

Read more >
February 21, 2018
Footer background image

The Role of Machine Learning in Intelligent Threat Response

Machine learning, or artificial intelligence (AI), is the most recent buzzword making its way around the cybersecurity community as a way to up-level and advance security capabilities. As threats become more sophisticated, machine learning IS needed; however, not every product touting itself as AI is just that. How can organizations determine if a product leverages […]

Read more >
November 28, 2017

Cyber Threat Scoring is not Risk Assessment

Companies face such a large and diverse cyber threat landscape, it seems almost impossible to manually review all known threats, let alone guard against them. With the potential of having to sift through 10s of millions of new threat intelligence data points every day, automation-assisted cyber threat management is on the rise. However, the question […]

Read more >
November 09, 2017
Footer background image

Down the BadRabbit Hole: Ransomware Delivered by Fake Flash Updates

In the past few weeks, a new strain of self-propagating ransomware dubbed BadRabbit emerged via infected media and government websites, primarily located in Russia and the Ukraine. This strain of malware is being closely compared to WannaCry and NotPetya for how it’s infected and impacted organizations. BadRabbit is delivered via drive-by download from sites infected […]

Read more >
November 09, 2017
Footer background image

Moving Beyond Threat Hunting to Actively Counter Threats

For those of you building proactive cybersecurity programs, this blog will cover some tips that I hope will help you determine how your security teams can increase the cost on the adversary when those actors attack your organization. Today, threat hunting encourages a more proactive approach to cybersecurity defense tactics. It requires enhancements to the […]

Read more >