The Unmeasured Cost of a Security Breach

Posted by Nate Buell    Dec 11, 2014 11:46:00 AM

Everything in today’s society is analytical.  Everyone wants to see the numbers associated with every piece of information available. Improvements in technology, namely Big Data, have made dollar amounts, stats and percentages readily available allowing us to measure everything now. 

As is the case for cyberattacks. In August, the New York Times had the cost of the Target breach at $148m, not including the drop in earnings on the stock market, or the total cost of the resources the company extended to recover from the hack – incident responders, PR teams etc.

Read More

“The Internet of Things” – Security Vulnerabilities Can Cause Bodily Harm?

Posted by Tom Bain    Nov 5, 2014 5:18:00 PM

We may have hit a ‘data breach fatigue’ saturation point across the market as of late, but there were a few other security vulnerability stories swirling this past week that seemed to deviate from the standard reports.

DHS is actually probing a number of medical device manufacturers to see if there are legitimate cybersecurity vulnerabilities in a number of pumps and implantable heart devices.

One thing that comes to mind with respect medical devices with internet connectivity, is that devices, like any other technology, have evolved. Medical devices are now programmable, configurable and are more advanced to accommodate so many patient conditions, complete with automation, data collection and storage requirements.

Read More

Topics: Cyber Security, endpoint security

When Zombies Attack - Hacker Halted and CISO Forum Wrap-up

Posted by Tom Bain    Oct 24, 2014 1:11:00 PM

It’s only so often that you can attend a conference with the dominant theme being the Zombie Apocalypse.

And no more fitting location than Atlanta, where it all started for the ‘Walking Dead.’ Yes, the walkers took Atlanta first and swarmed in an outward fashion from there to swarm the rest of the world for complete domination.

Read More

Topics: APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, cybersecurity research, Hacker Halted, CISO Forum 2014, Michael A. Davis, Zombies, EC Council, Hacker Halted 2014, CISO Forum

West Point Focuses Efforts on Cyber Defense with the Army Cyber Institute

Posted by Neal Creighton    Oct 7, 2014 2:33:38 PM

CounterTack would like congratulate the Army Cyber Institute (ACI) at West Point on its ribbon cutting ceremony on October 3, 2014. The ACI’s mission is an important one for our country and they have assembled an incredible team led by Colonel Greg Conti and Chair LTG (R) Rhett Hernandez. I was fortunate enough to be present for the ribbon cutting on a beautiful, sunny day along the Hudson River at West Point. 

Read More

Topics: Cyber Defense, APT, cybersecurity, endpoint security, CounterTack, Breaches, Security Intelligence, Neal Creighton, Gartner Cool Vendor, Army Cyber Institute, General Rhett Hernandez, Colonel Greg Conti, U.S. Army

The First Federally-Funded Cybersecurity Center of Excellence

Posted by Tom Bain    Sep 30, 2014 12:33:26 PM

This news flew under the radar for the most part, and I neglected to pick this up in a timely fashion through my feeds. But MITRE announced that it was awareded $29M to start the first federall-funded cybersecurity of excellence of its kind. Reports also state that this initiative could receive over $5B over the next 25 years. 

Read More

Topics: Cyber Defense, Network Security, APT, cybersecurity, Tom Bain, endpoint security, CounterTack, Security Intelligence, cybersecurity research, cybersecurity R&D

Do More Records Breached Necessarily Mean a More Severe Incident?

Posted by Tom Bain    Sep 22, 2014 5:03:00 PM

It has been reported that Home Depot has experienced a near-record data breach. We are talking 56M debit and credit cards.

Read More

Topics: malware, Cyber Attack, APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, threat detection, Breaches, Zero-day Attack, Breach, Gartner Cool Vendor, Microsoft XP Security, POS system data breach, Microsoft XP, Home Depot Data Breach, retail data breach

Cyber Resiliency is a Message That Resonates

Posted by Tom Bain    Sep 17, 2014 7:50:40 PM

I've been attending the Inbound Conference, hosted by HubSpot this week, to brush up on a few things in my discipline (Marketing). Speakers present new Marketing strategies, and mainly inspiration for Marketers to find truly different ways to communicate to audiences. Every session focuses on specific tactics, like blogging or email or telling better stories.

Read More

Topics: Cyber Crime, Cyber Defense, Cyber Security, Cyber Attack, APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, threat detection, Zero-day Attack, Security Intelligence, Breach, Gartner Cool Vendor

Endpoint + Network Detection: Better Together

Posted by Michael Davis    Sep 5, 2014 6:00:00 PM

Defense in Depth is touted in the security industry daily. Every engineer learns about the concept in university and countless whitepapers will expound that it can save your butt when an attack occurs.

Read More

Topics: cybersecurity, Sentinel, endpoint security, Gartner Cool Vendor, endpoint security integration

Understand Your Data and Don't Wait Until After You Are Breached

Posted by Tom Bain    Aug 19, 2014 9:47:00 AM

Another day, another data breach. I'd like to offer two opinions with respect to breaches we read about regularly.

1) Its really not about the data with some data breaches - its about the money.

2) Why is it that so many organizations don't take a proactive, continuous stance in protecting their assets? You don't have to wait for a post-breach forensics investigation to understand what went wrong. 

It was reported late yesterday that Community Health Systems experienced a data breach that impacted 4.5M customers across potentially 28 states. This attack is in fact interesting, given that the same attackers have been attributed to pilfering trade secrets within the healthcare industry in successfully executed hacks previously. It looks like by all accounts, the attackers used some targeted malware to break into Community Health Systems to steal patient data and not exactly IP that ultimately may get sold to China.

Read More

Trends in the Information Security Industry

Posted by Tom Bain    Jul 11, 2014 12:24:00 PM

CounterTack has been buzzing lately based on our rising position within the endpoint threat detection market. We're in the news more often now, but we also are on the radar of the investment community, who is hot after innovative cyber security companies who are helping global organizations defend their businesses against increasingly persistent attackers and insiders.

There are a number of media outlets taking note of how investors have started to focus more on cybersecurity, like XConomy, who recently referenced CounterTack as having a $5M addition to a funding round. The reality is the larger technology companies simply can't innovate as quickly as smaller, more agile startups, who are tailoring their approach to solve very specific problems leveraging in new ways to get it done. 

As a guest blogger on VentureFizz, a leading news, networking and information site for the technology startup and VC community, I interviewed Mark Spoto, General Manager at Razor's Edge Ventures. Razor's Edge is part of CounterTack's investment syndicate, and he elaborated on what drew him to CounterTack, the challenges he sees organizations trying to solve and the impact that startup innovation is having on the industry. 

Read More

Topics: Cyber Security, Sentinel, CounterTack, Gartner Cool Vendor

Blog covers topics related to detecting and monitoring in-progress cyber attacks for IT security operations teams.

Subscribe to Email Updates