Contact Sales

endpoint security blog

Final-Connect-Image.jpg

Michael Davis

As CounterTack's CTO, Michael Davis is responsible for driving the advancement of CounterTack's revolutionary endpoint security platform, as well as leveraging his visionary approach to push defenders ahead of attackers. Davis has earned a reputation as one of the nation's leading authorities on information technology. The list of organizations that rely on his council includes AT&T, Sears, Exelon, and the US Department of Defense. Prior to CounterTack, Davis was President of External IT, a national managed IT services and cloud services provider that focuses on unifying the business IT experience. In 2005, he founded Savid Technologies, an IT security consulting firm. He led Savid to be the 23rd fastest growing company in Chicago as measured by Inc. magazine, and by 2010, Savid was ranked 611 on the Inc. 5000 list of fastest growing companies in America. Prior to Savid, he served as senior manager of global threats at McAfee, where he led a team of researchers investigating confidential and cutting-edge security analysis. As an entrepreneur he was voted one of the “Top 25 under 25” by BusinessWeek, semi-finalist of the Ernst and Young “Entrepreneur of the Year” award, and a “Web 2.0 Wonderkid” for his online marketing capabilities. Davis is a contributing author to the top selling computer security book, Hacking Exposed, as well as Hacking Exposed: Malware and Rootkits, and he is a frequent contributor to industry and business publications including InformationWeek and Dark Reading. He regularly speaks at noted industry conferences including Black Hat, Interop, SuperStrategies, and InfoSecWorld

Recent Posts

Endpoint Security - Respond to Threats Entirely Locally

They say imitation is the sincerest form of flattery—and we agree! Today we saw other endpoint security vendors promote their “streaming prevention.” Well we say “welcome to the club guys,” because this isn’t a new technology.

Read More

Topics: Blog

Cyber Security Solutions - What to expect in 2017?

As global cyber security attacks intensify and attackers continue to grow in sophistication, the industry faces increasing challenges in the years ahead. Following are some of my predictions on what we can expect to see in the cyber security protection landscape in 2017—both in terms of industry trends and rising threats: 

Read More

Topics: Predictions, cybersecurity, Blog, IoT, Monitoring

Endpoint Security Makes Quantum Shift: Part IV - Resolution

Malware Analysis Process Matters

Gartner has been the most vocal about the need for a process shift, advocating what it calls an “adaptive malware security architecture.” The idea is to balance efforts among attempting to predict when a breach will occur, prevent­ing the ones you can, detecting what a suc­cessful attacker has done on the endpoint, and ultimately responding to the attack in some way. You need to be doing all of these, all the time, with a variety of technologies, so you can respond appropriately.

“How you protect yourself from a shotgun blast is very different than how you protect yourself from a sniper’s bullet,” says Neal Mac­Donald, VP distinguished analyst at Gartner.

Let’s look at a real-world example of why you need change now, before you get stuck in the quicksand of a disastrous endpoint breach your prevention tools missed.

Read More

Topics: Cyber Security, malware analysis, endpoint security, malware attack, malware security

Endpoint Security Makes Quantum Shift: Part III - Not Just for Ops

The SANS study asked respondents what percentage of their incident response pro­cesses are automated through the use of purpose-built tools for remediation workflow. Just 16% automate more than 51% of inci­dent response tasks. No wonder attackers go undetected for months or even years. And, no wonder we can’t deliver even the most fundamental answers to what happened in a breach.

Automation tends to spook IT profession­als. But you should be more afraid of what happens without it. We discuss automation in depth in our 2014 DevOps Survey report. DevOps is all about automation, and it can be a boon for security. It opens up architectural discussions and forces entrenched IT constit­uencies into a mature process, getting people to trust in repeatable and reliable automated processes.

Read More

Topics: Cyber Attack, endpoint security

Endpoint Security Makes Quantum Shift: Part II - Up The Stack

Given the endless game of whack-a-mole that is IT malware security, it makes sense that, as anti-virus effectiveness waned, malware analysis software vendors moved to network-level prevention. The idea: We won’t need to scramble to keep malware attack off endpoints if we can block the exploit or malware security at the email server or web gateway.

From network-based anomaly detection to advanced sandboxing, these tools flooded the market and worked great — for a while. As they always do, attackers adjusted, adding new techniques, such as encryption and fast-flux DNS. It is an arms race, after all. Some malware attackers started to obscure their exploits, hiding in plain sight by blending with innocuous network traffic. Others simply stopped aiming at the network. No network traffic means no results from network detection tools.effectiveness waned, malware security software vendors moved to network-level prevention. The idea: We won’t need to scramble to keep malware off endpoints if we can block the exploit or malware security at the email server or web gateway.

Read More

Topics: malware analysis, endpoint security, malware attack, malware security

Endpoint Security Makes Quantum Shift: Part I

Rest in peace, antivirus tools. You had a good run for a security technol­ogy — 1987 to 2014.

In case you missed it, in May, Sy­mantec called time of death for antivirus software. It did so not because AV technologies suddenly became less effective. Rather, the company finally acknowledged that it’s not a matter of if, but when, an orga­nization will be targeted and that antivirus products will stop only some attacks. Plenty of security bloggers and pundits reacted with glee, given that antivirus software reportedly represents 40% of Symantec’s revenue.

Read More

Topics: endpoint security

Endpoint + Network Detection: Better Together

Defense in Depth is touted in the security industry daily. Every engineer learns about the concept in university and countless whitepapers will expound that it can save your butt when an attack occurs.

Read More

Topics: cybersecurity, Sentinel, endpoint security, Gartner Cool Vendor, endpoint security integration

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all