endpoint security: amplified

Final-Connect-Image.jpg

Endpoint Detection and Response (EDR)—A Look at the Evolving Industry

Over the past 18 months we’ve watched the Endpoint Detection and Response (EDR) market evolve and take shape as organizations both small and large and across industry are recognizing the need to protect the endpoint.  A clear focus for technology market-wide, has been on trying to solve customer challenges by detecting threats faster and with more efficacy, integrating endpoint intelligence into other platforms, improving SOC workflow and preventing commodity malware in favor of focusing more on advanced threats. 

Read More

Topics: cybersecurity, EDR, SIEM

Cyber Security Solutions - What to expect in 2017?

As global cyber security attacks intensify and attackers continue to grow in sophistication, the industry faces increasing challenges in the years ahead. Following are some of my predictions on what we can expect to see in the cyber security protection landscape in 2017—both in terms of industry trends and rising threats: 

Read More

Topics: Predictions, cybersecurity, Blog, IoT, Monitoring

Do You Value Time or Knowledge on Cyber Security Protection? Change the Discussion

As we head into the final stretch before RSA, CounterTack, like most cyber security protection organizations, is realizing how critical every day, every hour and every minute is, relative to the work we are doing for our customers in protecting their IT infrastructure. 

And as each vendor, enterprise organization, partner and investor gets ready for five days of meetings, presentations, job interviews and cocktails, RSA is typically the platform for numerous announcements and cyber security tools advancements. 

Read More

Topics: cybersecurity, Next-gen endpoint security, cyber attcks, attack dwell time

Detecting and Remediating Against File Distribution Attacks

Enterprise teams have varying means to some degree, of how they “see” attacks. There is often incongruence between what events they can detect, what their intelligence means, and the potential impact of an attack. 

At CounterTack, we are developing new technologies to help customers better detect and understand their threat tolerance. We are innovating methods to help customers improve security response by contextualizing threat impact into actionable intelligence.

Read More

Topics: cybersecurity, Sentinel, CounterTack, EDR, endpoint detection and response, Shamoon, file distribution attacks, Kirby Kuehl, cyber attacks

The Next Generation Endpoint Is Truly Here - Malware Security

The RSA Conference was an interesting experience, particularly for those in the endpoint malware security market, or those attempting to break into this emerging market. It seems everyone at this point has some type of endpoint play, regardless of their technology heritage, or prior security focus.

It was at the America’s Growth Capital conference, a simultaneous gathering of investors and security types, that perhaps one of the more interesting panels took place, albeit, the final panel session of the day. With 1 billion endpoints in need of help, its clear this is the hottest market across the broadening security industry. 

Malware security Issues

Read More

Topics: Cyber Attack, APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, Breaches, Zero-day Attack, Neal Creighton, data breach, Big Data Security, EDR, Big Data EDR, RSA Conference 2015, endpoint detection and response, AGC

When Zombies Attack - Hacker Halted and CISO Forum Wrap-up

It’s only so often that you can attend a conference with the dominant theme being the Zombie Apocalypse.

And no more fitting location than Atlanta, where it all started for the ‘Walking Dead.’ Yes, the walkers took Atlanta first and swarmed in an outward fashion from there to swarm the rest of the world for complete domination.

Read More

Topics: APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, cybersecurity research, Hacker Halted, CISO Forum 2014, Michael A. Davis, Zombies, EC Council, Hacker Halted 2014, CISO Forum

West Point Focuses Efforts on Cyber Defense with the Army Cyber Institute

CounterTack would like congratulate the Army Cyber Institute (ACI) at West Point on its ribbon cutting ceremony on October 3, 2014. The ACI’s mission is an important one for our country and they have assembled an incredible team led by Colonel Greg Conti and Chair LTG (R) Rhett Hernandez. I was fortunate enough to be present for the ribbon cutting on a beautiful, sunny day along the Hudson River at West Point. 

Read More

Topics: Cyber Defense, APT, cybersecurity, endpoint security, CounterTack, Breaches, Security Intelligence, Neal Creighton, Gartner Cool Vendor, Army Cyber Institute, General Rhett Hernandez, Colonel Greg Conti, U.S. Army

The First Federally-Funded Cybersecurity Center of Excellence

This news flew under the radar for the most part, and I neglected to pick this up in a timely fashion through my feeds. But MITRE announced that it was awareded $29M to start the first federall-funded cybersecurity of excellence of its kind. Reports also state that this initiative could receive over $5B over the next 25 years. 

Read More

Topics: Cyber Defense, Network Security, APT, cybersecurity, Tom Bain, endpoint security, CounterTack, Security Intelligence, cybersecurity research, cybersecurity R&D

Cyber Resiliency is a Message That Resonates

I've been attending the Inbound Conference, hosted by HubSpot this week, to brush up on a few things in my discipline (Marketing). Speakers present new Marketing strategies, and mainly inspiration for Marketers to find truly different ways to communicate to audiences. Every session focuses on specific tactics, like blogging or email or telling better stories.

Read More

Topics: Cyber Crime, Cyber Defense, Cyber Security, Cyber Attack, APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, threat detection, Zero-day Attack, Security Intelligence, Breach, Gartner Cool Vendor

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all