endpoint security: amplified

Final-Connect-Image.jpg

CounterTack’s Ransomware Protect Organizations Against WannaCry

The WannaCry ransomware started to hit companies worldwide this past Friday, setting off a wave a panic about what to do about it. The reality is this attack will continue to proliferate, and it will likely continue to command attention from CISOs to the boardroom to the media for the upcoming weeks. The attack was first reported to have started to hit companies in Europe and Asia this past Friday, and so far to-date, over 200,000 systems in 150 countries.

Read More

Topics: Zero-day Attack, Ransomware, wannacry, ransomware virus, ransomware attacks, ransomware protection

The Next Generation Endpoint Is Truly Here - Malware Security

The RSA Conference was an interesting experience, particularly for those in the endpoint malware security market, or those attempting to break into this emerging market. It seems everyone at this point has some type of endpoint play, regardless of their technology heritage, or prior security focus.

It was at the America’s Growth Capital conference, a simultaneous gathering of investors and security types, that perhaps one of the more interesting panels took place, albeit, the final panel session of the day. With 1 billion endpoints in need of help, its clear this is the hottest market across the broadening security industry. 

Malware security Issues

Read More

Topics: Cyber Attack, APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, Breaches, Zero-day Attack, Neal Creighton, data breach, Big Data Security, EDR, Big Data EDR, RSA Conference 2015, endpoint detection and response, AGC

Cyber Resiliency is a Message That Resonates

I've been attending the Inbound Conference, hosted by HubSpot this week, to brush up on a few things in my discipline (Marketing). Speakers present new Marketing strategies, and mainly inspiration for Marketers to find truly different ways to communicate to audiences. Every session focuses on specific tactics, like blogging or email or telling better stories.

Read More

Topics: Cyber Crime, Cyber Defense, Cyber Security, Cyber Attack, APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, threat detection, Zero-day Attack, Security Intelligence, Breach, Gartner Cool Vendor

Show Us the Way CryptoLocker!

Ransomware is a class of crimeware that locks down an infected system by preventing user’s access to their data stored locally or via accessible shared network drives. Access is only sometimes restored to the victim after a sum of money is transferred to a digitally remote blackmailer.

CryptoLocker is one of the latest variants in this family surfacing over the last few months has recently made some noise across the industry. Ransomware is one of the busiest (and most annoying) threats of 2013, and is experiencing another comeback tour so we decided it’s time to take a peek under the hood of the latest variant’s campaign to see what the author team is up to as of late and how different is the actual threat compared to the evasion techniques.

Read More

Topics: Cyber Crime, Cyber Security, malware, Cyber Attack, APT, cybersecurity, malware infection, malware analysis, Scout, Sentinel, endpoint security, CounterTack, Breaches, Zero-day Attack, in-progress attacks, Sean Bodmer

Sean Bodmer, Chief Security Researcher, CounterTack

We are pleased to announce Sean Bodmer as Chief Security Researcher at Countertack. Sean joins us from Damballa where he was also the senior security researcher. We believe that Sean will greatly enhance our mission in delivering “next generation” host intrusion detection & prevention.

A highly visible authority on the frontlines of cyber security, Bodmer brings a unique background and industry perspective to advanced threat detection and analysis to CounterTack.

Read More

Topics: Cyber Crime, Cyber Defense, Cyber Security, Predictions, Cyber Attack, Cyber attack intelligence, APT, Zero-day Attack, Breach

Introducing CounterTack’s New Senior Vice President of Sales

We are very pleased to introduce Kirk Appelman to the CounterTack team today as senior vice president of sales. Kirk, a veteran security executive, will be responsible for the direction and management of our sales operations, as well as driving CounterTack’s overall revenue growth.

Specializing in information security for more than a decade, Kirk holds more than 20 years’ experience in technology sales and sales management. He joins our team from Damballa, where he served as vice president of service provider solutions and established the company’s Telco/ISP business, which under his leadership became a substantial piece of the company’s overall revenue. He also established the company’s international presence by signing marquis clients across Europe and Asia. Prior to Damballa, he was a director of sales at Proofpoint, where he restructured and led the successful growth of the company’s business in the Eastern United States. Throughout his career, Kirk has also held sales leadership positions with McAfee, Juniper Networks and Internet Security Systems (ISS). You can read Kirk’s full bio here.

Read More

Topics: Cyber Defense, Cyber Security, Cyber Attack, Cyber attack intelligence, APT, Honeynets, Detecting in-progress attack, Breaches, Zero-day Attack, News, Breach

Lateral Movement – A Critical Opportunity to Detect an In-progress Cyber Attack

Industry discussion and analysis of many recent high profile cyber attacks– such as the RSA and Sony breaches – indicate that these attacks each followed a distinct, multi-stage approach to penetrating the organization’s network, targeting sensitive data and successfully stealing it. There’s been a tremendous focus on stopping an initial breach, but little focus on the following stages. That needs to change.

Read More

Topics: Cyber Defense, Network Security, Breaches, Zero-day Attack, Security Intelligence

Timing is Everything

Time is of the essence when it comes to cyber crime, and according the latest numbers, determined cyber criminals are willing to take plenty of it – patiently waiting, watching, finding, and ultimately, compromising your assets. In fact, according to Verizon’s 2011 Data Breach Investigations Report, the company indicates more than 60 percent of 2011 breaches happened over a span of “months or longer before discovery.” That’s a long while for an intruder to spend casing the joint. By the time he’s ready to move on, no doubt he’s had enough time to uncover your organization’s most critical assets.

Read More

Topics: Cyber Crime, Research, Breaches, Zero-day Attack, Security Intelligence, Virtualization

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all