Blog

  • From
  • to

Cybercrime, Not an Act of War

Sometimes, when a network is breached, when servers are compromised, or when unencrypted data is at risk, companies will get, or even seek, assistance from government offices. The nature of cybercrime points to the ways in which our digital architectures are interconnected – over the Internet, but also in terms…

September 23, 2016

Sean Roth

Anti VM Tricks

The Sample Recently, I was tasked with investigating a malware sample which sometimes failed to behave maliciously. Unlike normal people, I spend a lot of time trying to run malware and it can be surprisingly difficult to get it to behave like it should. Any number of things can go…

September 22, 2016

Caleb Fenton

Mary Shelley’s Frankenstein: The New Prometheus – The Challenges of Protecting Technological Progress

Long before it was reduced to something you’d see on a cereal box, or on a cardboard cutout in the department store as Halloween rolls around, Mary Shelley’s Frankenstein was a story of power, prestige, and the supernatural blended with man’s ability to push the limits of technological progress. On…

September 21, 2016

Sarah Vanier

Malware Attacks Get Organized

Regardless of whether you call it ransomware, malware, or viruses, these nuisance programs account for a growing number of attacks against your company every year. While the process of creating malware may have started as a challenge amongst hackers years ago, it has gotten organized and turned into a new…

September 19, 2016

Scott Gainey

Teaching Corporate Cyber Security With Gamification

Every year the number, complexity, and size of security breaches increases. It’s no surprise that in our constantly connected world with mobile devices, most people have multiple devices that can be exploited, many of them with a continuous high-speed connection to the internet. These security breaches typically occur because employees…

September 16, 2016

Sarah Vanier

Law Firm Security Must Rapidly Embrace Cyber Security Controls for the Sake of their Customers

Here's a somewhat reductive statement: There are only two kinds of companies—you're either a law firm, or you do business with one. It's broadly true. All but the smallest companies preserve some kind of a relationship with a lawyer or a law firm, and not just for reasons involving litigation.…

September 14, 2016

Sean Roth

What I Learned About From Being a HIPAA Network Security Sheriff (for One Day)

In the medical office in which I briefly worked a few years back, we had some interesting internal customs, but one thing that stuck out was the HIPAA sheriff. Once Upon a Time on the Desk One day, the boss came by and wordlessly dumped a cheap toy sheriff star…

September 12, 2016

Scott Gainey

Next Generation Endpoint Security, Part Six: Forensics

It’s pretty uncomfortable to admit, but there may be a day when a piece of malware gets past SentinelOne. It might be some ultra-advanced piece of software designed by a hostile nation-state, or an unbelievably stealthy piece of hitherto-unseen ransomware. No matter when or how it happens, we're prepared. For…

September 09, 2016

Scott Gainey

9 Tips for Securing the Cloud

There's no doubt that more and more companies are moving their infrastructure, applications, and data to the cloud. The cloud is a great way to use and deploy technology throughout your organization efficiently and effectively no matter how disparate the departments or locations. While the cloud offers a multitude of…

September 07, 2016

Sarah Vanier

7 Steps to Better Your Cyber SMB Security

When we read about companies the size of Marriott and Hyatt becoming victims of malware and cyberattacks, it may concern business owners. However, it’s easy to think, “We’re a smaller company, so we’re not as likely to be attacked.” You may think your small to medium-sized business (SMB) is less…

September 05, 2016

Sean Roth

1 2 3 11