Endpoint February 20, 2018 The Art of Disclosing Your Incident Response Strategy to the Public 4 min read - As data breaches gain public attention, vulnerability disclosure becomes an increasingly crucial part of the incident response process.
Endpoint February 1, 2018 Why Endpoint Management Is Critical to Security Strategy 4 min read - Endpoint management and security is a daily battle. You need a solution that helps you discover, manage and secure your endpoints faster, more easily and more consistently.
Threat Intelligence January 8, 2018 Six Major Data Breach Trends From 2017 9 min read - IBM X-Force monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents.
Endpoint November 29, 2017 Moving Target Defense: A Digital Shell Game 3 min read - Moving target defense constantly shifts the environment surrounding sensitive data, making it harder for would-be attackers to identify vulnerabilities.
Endpoint November 20, 2017 Wireless Security Lessons From the WPA2 Vulnerability 3 min read - One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.
Incident Response November 13, 2017 The Ugly Duckling’s Security Testing Transformation 2 min read - Some are wary of the Ugly Duckling due to his advanced hacking abilities, but when it comes to security testing, he's really one of the good guys.
Intelligence & Analytics November 8, 2017 Proactive or Reactive Endpoint Security? A Critical Crossroads for SOC Analysts 2 min read - As the cybercrime landscape expands, SOC teams need endpoint security tools that can reduce the time it takes to gain actionable threat intelligence.
Threat Intelligence October 25, 2017 Threat Intelligence: A Tear-Free Solution to Help SOC Analysts Prepare for the Next WannaCry 2 min read - An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
Software Vulnerabilities October 17, 2017 Don’t Just Put Out the Zero-Day Fire — Get Rid of the Fuel 5 min read - The best way to remediate zero-day threats is to focus on proactively assessing and patching the vulnerabilities that facilitate them.
Endpoint October 9, 2017 Five Key Differences Between Personal and Enterprise Endpoint Security 3 min read - CISOs must understand the key difference between individual and enterprise endpoint security to adequately protect corporate data.