endpoint security: amplified

Final-Connect-Image.jpg

West Point Focuses Efforts on Cyber Defense with the Army Cyber Institute

CounterTack would like congratulate the Army Cyber Institute (ACI) at West Point on its ribbon cutting ceremony on October 3, 2014. The ACI’s mission is an important one for our country and they have assembled an incredible team led by Colonel Greg Conti and Chair LTG (R) Rhett Hernandez. I was fortunate enough to be present for the ribbon cutting on a beautiful, sunny day along the Hudson River at West Point. 

Read More

Topics: Cyber Defense, APT, cybersecurity, endpoint security, CounterTack, Breaches, Security Intelligence, Neal Creighton, Gartner Cool Vendor, Army Cyber Institute, General Rhett Hernandez, Colonel Greg Conti, U.S. Army

The First Federally-Funded Cybersecurity Center of Excellence

This news flew under the radar for the most part, and I neglected to pick this up in a timely fashion through my feeds. But MITRE announced that it was awareded $29M to start the first federall-funded cybersecurity of excellence of its kind. Reports also state that this initiative could receive over $5B over the next 25 years. 

Read More

Topics: Cyber Defense, Network Security, APT, cybersecurity, Tom Bain, endpoint security, CounterTack, Security Intelligence, cybersecurity research, cybersecurity R&D

Cyber Resiliency is a Message That Resonates

I've been attending the Inbound Conference, hosted by HubSpot this week, to brush up on a few things in my discipline (Marketing). Speakers present new Marketing strategies, and mainly inspiration for Marketers to find truly different ways to communicate to audiences. Every session focuses on specific tactics, like blogging or email or telling better stories.

Read More

Topics: Cyber Crime, Cyber Defense, Cyber Security, Cyber Attack, APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, threat detection, Zero-day Attack, Security Intelligence, Breach, Gartner Cool Vendor

Webcast: Virtual Machine Introspection to Combat APTs

It’s time to face it. Traditional perimeter security defense is dead. The question enterprise organizations face is no longer “Will I be breached?” But instead, “Have I already been breached? Do I have an active threat inside my network right now? And if so, where is it, what is it doing right now and what is it after?”

Read More

Topics: Cyber Attack, APT, virtual machine introspection, Security Intelligence, webcast

Virtual Machine Introspection: Think “Inside the Box”

“Even the best security technology and expertise can’t stop a well-funded and determined attacker,” writes Dark Reading’s Kelly Jackson Higgins.

Read More

Topics: APT, virtual machine introspection, Security Intelligence, Virtualization

Lateral Movement – A Critical Opportunity to Detect an In-progress Cyber Attack

Industry discussion and analysis of many recent high profile cyber attacks– such as the RSA and Sony breaches – indicate that these attacks each followed a distinct, multi-stage approach to penetrating the organization’s network, targeting sensitive data and successfully stealing it. There’s been a tremendous focus on stopping an initial breach, but little focus on the following stages. That needs to change.

Read More

Topics: Cyber Defense, Network Security, Breaches, Zero-day Attack, Security Intelligence

Intelligence-driven Information Security is Key to Combating APTs, Says Report

The future of battling advanced persistent threats will rely heavily on intelligence-driven information security, according to a new report from the Security of Business Innovation Council (SBIC), sponsored by RSA. 

Read More

Topics: Cyber Attack, Research, Breaches, Security Intelligence, RSA

Timing is Everything

Time is of the essence when it comes to cyber crime, and according the latest numbers, determined cyber criminals are willing to take plenty of it – patiently waiting, watching, finding, and ultimately, compromising your assets. In fact, according to Verizon’s 2011 Data Breach Investigations Report, the company indicates more than 60 percent of 2011 breaches happened over a span of “months or longer before discovery.” That’s a long while for an intruder to spend casing the joint. By the time he’s ready to move on, no doubt he’s had enough time to uncover your organization’s most critical assets.

Read More

Topics: Cyber Crime, Research, Breaches, Zero-day Attack, Security Intelligence, Virtualization

Subscribe to Email Updates

Posts by Topic

see all