Get a product demo, ask a technical question, or just contact us.
Get to know our blog author backgrounds and perspectives >
Co3 Systems BlogCSO Blogs
Cylance BlogDark Reading BlogCylance Technical BlogForrester Security & RiskGartner - Anton ChuvakinGartner - Neil MacDonaldIdoneous Security - Wendy Nather, 451 ResearchRational Survivability - Chris HoffSecurity Bloggers NetworkVerdasys Blog
Ransomware is a class of crimeware that locks down an infected system by preventing user’s access to their data stored locally or via accessible shared network drives. Access is only sometimes restored to the victim after a sum of money is transferred to a digitally remote blackmailer.
Analytics are an incredibly powerful source of information that can help teams drill down into often obscure or hard-to-analyze information, and make sense of data they wouldn’t normally have collected and organized.
Sometimes you can equate certain situations to others, i.e., actions you may take in your professional life might mimic actions you took as a child.
Last week, the New York Times reported that just three months after hackers working for the Chinese People’s Liberation Army went dark, they’re back at it again, targeting countless American companies and government agencies. The group is responsible for many high profile breaches – from Coca-Cola to RSA to Lockheed Martin. While many of us were not surprised by this recent resurgence of attacks, it is very troubling to note that “the victims were many of the same ones the unit had attacked before.”
Last week, Gartner presented their Top Security Trends and Takeaways for 2013 that was led by Earl Perkins, Research VP. Perkins took a comprehensive look at the shifting challenges and opportunities within the cybersecurity field.
Today we announced Scout 4, with a new kernel-level Stealth Agent and an enhanced analysis engine. These new features enable active defense solutions against in-progress attacks while significantly reducing dwell time - the time available for attackers to operate on the network and cause damage.
What We’re Reading this Week
The Pitfalls Behind and Ahead: Part 2
Invasive network, workstation and server attacks aren’t unique to this side of the pond. And, despite advancements in security technology there is still a significant detection gap, with cyber attackers outpacing cyber defenses.
© 2013 CounterTack Inc.
CounterTack, Inc. 303 Wyman StreetWaltham, MA 02451-1208Toll Free: 855-893-5428
© 2013 CounterTack Inc.