endpoint security: amplified

Final-Connect-Image.jpg

Top Three Cybersecurity Predictions for 2018

Mike Davis, CTO of CounterTack – As 2018 rapidly approaches, there is one thing we know for certain – cybersecurity will continue to dominate business, technology and mainstream media. The words “ransomware” “phishing” and “crypto miner” will be included in everyday conversations regardless of age, career or nationality. No longer are these terms confined to those in IT.  The following are my top three cybersecurity predictions for 2018.

Read More

Topics: Predictions, malware, cybersecurity, endpoint security, CounterTack, EDR, endpoint detection and response, Email Phishing, Ransomware, MSSP, IoT, advanced attacks, crypto miner, MDR, internet of things, crypto currency, bitcoin, fileless, zero day

Notpetya, petya, its cousins, and What You Should Know About the Impact on Your Endpoints

A few days ago, NotPetya came into our purview, and left enterprises globally with many questions.

Read More

Topics: CounterTack, Ransomware, Petya, NotPetya, advanced attacks

CounterTack Announces Series D and Continued Growth


This week, CounterTack announced a Series D round of financingThis round of funding is led by new CounterTack investor Singtel Innov8 (venture capital arm of The Singtel Group), along with SAP National Security Services (SAP NS2 ™), also a new investor in CounterTack.

 

Read More

Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, endpoint security solution, memory analysis

CounterTack’s Ransomware Protect Organizations Against WannaCry

The WannaCry ransomware started to hit companies worldwide this past Friday, setting off a wave a panic about what to do about it. The reality is this attack will continue to proliferate, and it will likely continue to command attention from CISOs to the boardroom to the media for the upcoming weeks. The attack was first reported to have started to hit companies in Europe and Asia this past Friday, and so far to-date, over 200,000 systems in 150 countries.

Read More

Topics: Zero-day Attack, Ransomware, wannacry, ransomware virus, ransomware attacks, ransomware protection

CryptoLocker: What's Old is New Again (in cyber years)


It’s been a few years since we have seen CryptoLocker on a regular basis, but now it seems to be making its rounds again via a new spam campaign. The new CryptoLocker variant has been around for many years, and has evolved over that time.

CryptoLocker used to be very popular back when the Zeus botnet was making its rounds. The way it worked was once a computer was infected with the Zeus malware, it would be used to push the CryptoLocker ransomware onto the machine.

Read More

Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, CryptoLOcker, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, Micah Graf, endpoint security solution, memory analysis

Take your SMB cyber program from “I hope,” to “I know”

As a small business or mid-sized organization, cybersecurity can mean very different things. Most small businesses have less resources available to deal with threats.

Read More

Topics: Tom Bain, CounterTack, EDR, endpoint detection and response, SMB, SMB Security, ThreatScan PRO, on-demand endpoint scanning

Endpoint Security, EDR Vendors Move to Platform

It’s an incredibly exciting time to be in the endpoint security market and particularly as a next-generation provider. There is so much opportunity to help protect businesses in every industry and every size. And we have so much potential to be innovative, agile and adapt to the market’s evolving needs. Coming out of RSA 2017, I’ve never been more confident in CounterTack’s position in the market, and the direction we’re headed with innovation and technology.

Read More

Endpoint Security - Respond to Threats Entirely Locally

They say imitation is the sincerest form of flattery—and we agree! Today we saw other endpoint security vendors promote their “streaming prevention.” Well we say “welcome to the club guys,” because this isn’t a new technology.

Read More

Topics: Blog

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all