endpoint security: amplified

Final-Connect-Image.jpg

Exposing Attacker Activity

This video post is one in a series of technical blog posts examining various attack scenarios through video simulations of CounterTack’s Event Horizon platform. Today, CounterTack’s Nenad Kreculj exposes some tactics cyber attackers use to hide their actions.

Read More

Topics: Cyber Security, Cyber attack intelligence, virtual machine introspection, Event Horizon

How Hackers Hide Their Tracks: Part 1

This is the first in a series of technical blog posts examining various attack scenarios through video simulations of CounterTack’s Event Horizon platform.   

Read More

Topics: APT, virtual machine introspection, Detecting in-progress attack, Event Horizon

Webcast: Virtual Machine Introspection to Combat APTs

It’s time to face it. Traditional perimeter security defense is dead. The question enterprise organizations face is no longer “Will I be breached?” But instead, “Have I already been breached? Do I have an active threat inside my network right now? And if so, where is it, what is it doing right now and what is it after?”

Read More

Topics: Cyber Attack, APT, virtual machine introspection, Security Intelligence, webcast

Virtual Machine Introspection: Think “Inside the Box”

“Even the best security technology and expertise can’t stop a well-funded and determined attacker,” writes Dark Reading’s Kelly Jackson Higgins.

Read More

Topics: APT, virtual machine introspection, Security Intelligence, Virtualization

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all