endpoint security: amplified

Final-Connect-Image.jpg

CryptoLocker: What's Old is New Again (in cyber years)

It’s been a few years since we have seen CryptoLocker on a regular basis, but now it seems to be making its rounds again via a new spam campaign. The new CryptoLocker variant has been around for many years, and has evolved over that time.

CryptoLocker used to be very popular back when the Zeus botnet was making its rounds. The way it worked was once a computer was infected with the Zeus malware, it would be used to push the CryptoLocker ransomware onto the machine.

Read More

Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, CryptoLOcker, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, Micah Graf, endpoint security solution, memory analysis

Take Your SMB Cyber Program from “I Hope,” to “I Know”

As a small business or mid-sized organization, cybersecurity can mean very different things. Most small businesses have less resources available to deal with threats.

Read More

Topics: Tom Bain, CounterTack, EDR, endpoint detection and response, SMB, SMB Security, ThreatScan PRO, on-demand endpoint scanning

Endpoint Security, EDR Vendors Move to Platform

It’s an incredibly exciting time to be in the endpoint security market and particularly as a next-generation provider. There is so much opportunity to help protect businesses in every industry and every size. And we have so much potential to be innovative, agile and adapt to the market’s evolving needs. Coming out of RSA 2017, I’ve never been more confident in CounterTack’s position in the market, and the direction we’re headed with innovation and technology.

Read More

It’s Valentine’s Day at RSA – And We’re Flattered!

They say imitation is the sincerest form of flattery—and we agree! Today we saw other endpoint security vendors promote their “streaming prevention.” Well we say “welcome to the club guys,” because this isn’t a new technology.

Read More

Topics: Blog

EDR: An Essential Component of the SOC

As a leading platform provider to enterprise and Federal customers in the endpoint detection and response (EDR) market, we’ve been closely watching the changing nature of how Security Operations Centers (SOC’s) are structured for optimal aggregation and correlation. We are seeing several trends emerge as SOC managers demand a more robust, yet less cumbersome set of integrations into SIEM platforms as their centralized cybersecurity lens into threat management.

Read More

Topics: EDR, cybsersecurity, SOC, SIEM

Endpoint Detection and Response (EDR)—A Look at the Evolving Industry

Over the past 18 months we’ve watched the Endpoint Detection and Response (EDR) market evolve and take shape as organizations both small and large and across industry are recognizing the need to protect the endpoint.  A clear focus for technology market-wide, has been on trying to solve customer challenges by detecting threats faster and with more efficacy, integrating endpoint intelligence into other platforms, improving SOC workflow and preventing commodity malware in favor of focusing more on advanced threats. 

Read More

Topics: cybersecurity, EDR, SIEM

2017 Cybersecurity Predictions

As global cybersecurity threats intensify and attackers continue to grow in sophistication, the industry faces increasing challenges in the years ahead. Following are some of my predictions on what we can expect to see in the cybersecurity landscape in 2017—both in terms of industry trends and rising threats: 

Read More

Topics: Predictions, cybersecurity, Blog, IoT, Monitoring

Do We Face Variable Threat Levels Based on Geographic Location?

In recent years, the Asia-Pacific (APAC) region has been increasingly scrutinized for the growth of cybercrime incidents and the perceived lack of cybersecurity knowledge and preventative measures in the region.  The good news is that we’re now seeing a real uptick in the region’s cybersecurity efforts, across the board.

Read More

Topics: EDR, APAC, Blog

Your Ransomware Choices: The Bad, The Ugly and The Mean

You can’t read the news these days without being blasted with yet another Ransomware story. Almost daily, there seems to be a new variant, a new name, and inevitably, new victims. The rise of Ransomware shouldn’t come as a surprise, since its execution is quite simple and the demands on the victims are not onerous.

Ransomware is not like an APT (Advanced Persistent Threat) - there is no need for long-term stealth operation, no need to explore the victim’s networks and resources, no need to steal credentials and no need to quietly and patiently exfiltrate sensitive data. With Ransomware, an exploit kit opens the door, and BANG, there it is, your PC is displaying a ransom note with detailed instructions on how to pay.

Read More

Topics: Cyber Attack, APT, Ransomware

Subscribe to Email Updates

Posts by Topic

see all