endpoint security: amplified

Final-Connect-Image.jpg

Detecting and Remediating Against File Distribution Attacks

Enterprise teams have varying means to some degree, of how they “see” attacks. There is often incongruence between what events they can detect, what their intelligence means, and the potential impact of an attack. 

At CounterTack, we are developing new technologies to help customers better detect and understand their threat tolerance. We are innovating methods to help customers improve security response by contextualizing threat impact into actionable intelligence.

Read More

Topics: cybersecurity, Sentinel, CounterTack, EDR, endpoint detection and response, Shamoon, file distribution attacks, Kirby Kuehl, cyber attacks

The Next Generation Endpoint Is Truly Here - Malware Security

The RSA Conference was an interesting experience, particularly for those in the endpoint malware security market, or those attempting to break into this emerging market. It seems everyone at this point has some type of endpoint play, regardless of their technology heritage, or prior security focus.

It was at the America’s Growth Capital conference, a simultaneous gathering of investors and security types, that perhaps one of the more interesting panels took place, albeit, the final panel session of the day. With 1 billion endpoints in need of help, its clear this is the hottest market across the broadening security industry. 

Malware security Issues

Read More

Topics: Cyber Attack, APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, Breaches, Zero-day Attack, Neal Creighton, data breach, Big Data Security, EDR, Big Data EDR, RSA Conference 2015, endpoint detection and response, AGC

When Zombies Attack - Hacker Halted and CISO Forum Wrap-up

It’s only so often that you can attend a conference with the dominant theme being the Zombie Apocalypse.

And no more fitting location than Atlanta, where it all started for the ‘Walking Dead.’ Yes, the walkers took Atlanta first and swarmed in an outward fashion from there to swarm the rest of the world for complete domination.

Read More

Topics: APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, cybersecurity research, Hacker Halted, CISO Forum 2014, Michael A. Davis, Zombies, EC Council, Hacker Halted 2014, CISO Forum

Cyber Resiliency is a Message That Resonates

I've been attending the Inbound Conference, hosted by HubSpot this week, to brush up on a few things in my discipline (Marketing). Speakers present new Marketing strategies, and mainly inspiration for Marketers to find truly different ways to communicate to audiences. Every session focuses on specific tactics, like blogging or email or telling better stories.

Read More

Topics: Cyber Crime, Cyber Defense, Cyber Security, Cyber Attack, APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, threat detection, Zero-day Attack, Security Intelligence, Breach, Gartner Cool Vendor

Endpoint + Network Detection: Better Together

Defense in Depth is touted in the security industry daily. Every engineer learns about the concept in university and countless whitepapers will expound that it can save your butt when an attack occurs.

Read More

Topics: cybersecurity, Sentinel, endpoint security, Gartner Cool Vendor, endpoint security integration

Trends in the Information Security Industry

CounterTack has been buzzing lately based on our rising position within the endpoint threat detection market. We're in the news more often now, but we also are on the radar of the investment community, who is hot after innovative cyber security companies who are helping global organizations defend their businesses against increasingly persistent attackers and insiders.

There are a number of media outlets taking note of how investors have started to focus more on cybersecurity, like XConomy, who recently referenced CounterTack as having a $5M addition to a funding round. The reality is the larger technology companies simply can't innovate as quickly as smaller, more agile startups, who are tailoring their approach to solve very specific problems leveraging in new ways to get it done. 

As a guest blogger on VentureFizz, a leading news, networking and information site for the technology startup and VC community, I interviewed Mark Spoto, General Manager at Razor's Edge Ventures. Razor's Edge is part of CounterTack's investment syndicate, and he elaborated on what drew him to CounterTack, the challenges he sees organizations trying to solve and the impact that startup innovation is having on the industry. 

Read More

Topics: Cyber Security, Sentinel, CounterTack, Gartner Cool Vendor

RSA 2014: Looking for True Innovation in Endpoint Security?

RSA is here. It’s all about the latest and greatest security technologies, big personalities, networking, education. But really, it’s about opportunity and innovation.

Global attackers have afforded us that opportunity, and have put organizations in such a state of continuous compromise that now more than ever, it’s time for companies to re-think traditional security models.

Read More

Topics: cybersecurity, Sentinel, endpoint security, CounterTack, threat detection

Show Us the Way CryptoLocker!

Ransomware is a class of crimeware that locks down an infected system by preventing user’s access to their data stored locally or via accessible shared network drives. Access is only sometimes restored to the victim after a sum of money is transferred to a digitally remote blackmailer.

CryptoLocker is one of the latest variants in this family surfacing over the last few months has recently made some noise across the industry. Ransomware is one of the busiest (and most annoying) threats of 2013, and is experiencing another comeback tour so we decided it’s time to take a peek under the hood of the latest variant’s campaign to see what the author team is up to as of late and how different is the actual threat compared to the evasion techniques.

Read More

Topics: Cyber Crime, Cyber Security, malware, Cyber Attack, APT, cybersecurity, malware infection, malware analysis, Scout, Sentinel, endpoint security, CounterTack, Breaches, Zero-day Attack, in-progress attacks, Sean Bodmer

You Don't Need to Break Your Toys Because They 'Don't Work'

Sometimes you can equate certain situations to others, i.e., actions you may take in your professional life might mimic actions you took as a child. 

Read More

Topics: cybersecurity, Tom Bain, malware infection, malware analysis, Scout, Sentinel, automated security intelligence, automated security, endpoint security, CounterTack

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all