endpoint security: amplified

Final-Connect-Image.jpg

The First Federally-Funded Cybersecurity Center of Excellence

This news flew under the radar for the most part, and I neglected to pick this up in a timely fashion through my feeds. But MITRE announced that it was awareded $29M to start the first federall-funded cybersecurity of excellence of its kind. Reports also state that this initiative could receive over $5B over the next 25 years. 

Read More

Topics: Cyber Defense, Network Security, APT, cybersecurity, Tom Bain, endpoint security, CounterTack, Security Intelligence, cybersecurity research, cybersecurity R&D

CounterTack News Bulletin – April 22, 2013

What We’re Reading this Week

According to the Verizon Data Breach Report there was a significant increase in the number of cyber-attacks in 2012. Despite massive investments in cybersecurity, this increase is further proof of the expanding detection gap and underscores the great need for fundamental and far-reaching change. These startling numbers illustrate increasing danger, not only to enterprise organizations, but also to industrial giants, governments and countries alike. Fortunately, we have seen a marked shift in the response from Washington and government entities around the world. Cyber security is on the tip of everyone’s tongues, from President Obama listing it as a top priority in Chinese relations to the President of Estonia penning a cybersecurity op-ed in the New York Times. With that, we bring you CounterTack’s first weekly news bulletin. In these bulletins, we’ll look back at the week to highlight and analyze key headlines, trends and developments across the information security industry that caught our attention:

Read More

Topics: Cyber Security, Cyber Attack, Network Security, Cyber attack intelligence

Lateral Movement – A Critical Opportunity to Detect an In-progress Cyber Attack

Industry discussion and analysis of many recent high profile cyber attacks– such as the RSA and Sony breaches – indicate that these attacks each followed a distinct, multi-stage approach to penetrating the organization’s network, targeting sensitive data and successfully stealing it. There’s been a tremendous focus on stopping an initial breach, but little focus on the following stages. That needs to change.

Read More

Topics: Cyber Defense, Network Security, Breaches, Zero-day Attack, Security Intelligence

What to Expect at This Year’s RSA Conference

It’s finally here! The week everyone in the infosec community waits for all year long. The RSA Conference! (And no, we’re not just talking about all of the great parties and chances to catch up with old friends, colleagues and peers – though we’re looking forward to that too!) The CounterTack team has assembled in San Francisco and is hard at work putting the final touches on booth #845 – where we’ll soon unveil the industry’s first and only commercially available security platform powered by virtual machine introspection to combat in-progress cyber attacks. Sound interesting? Come check it out live during Expo hours and while you’re there, enter to win a Vespa scooter or cash prize.

Read More

Topics: Cyber Security, Network Security, RSA

Subscribe to Email Updates

Posts by Topic

see all