Predictive Security Intelligence

We have reached a state of data overload. Not too long ago “big data” just seemed like a buzz word thrown around to scare people into needing more tools to digest and consume the data overload within the organization. Now, big data has taken…

Read More

Most cyber-attacks take place in only five moves. Learn how to counter bad actors with five moves of your own to detect, deter, and remediate risks in your organization.

Read More

Day after day we see the evidence of an increased number of breaches (ie. The DNC email hack) and as a Privileged Account Management (PAM) provider, we are seeing a similar increase in requests for proposals on our Core PAM solution. Don’t get…

Read More

According to this year’s Verizon Data Breach Report, half of exploitations happen between 10 and 100 days with the median time being around 30 days. Of these exploitations, 85% of them are successful by using the top 10 most common vulnerabilities while the…

Read More

Today we are live from the RSA showroom as our Director of Product Management, Ray Suarez, gets ready to present "A Vulnerability Maturity Model That Thinks Like an Attacker". We brought you the first part of this series last week, and if you…

Read More

Confession - I loved David Letterman and I couldn't get enough of his Top 10 lists. So in that theme, I give you... the Top 5: You Know You're in Trouble When... You’re asked to move the Active Directory server to an open part of the…

Read More

According to the latest report from the Anti-Phishing Working Group, phishing campaigns are declining. Good news, right? Wrong! Research from RSA indicates that losses from phishing totaled $1.5 billion (PDF) in 2012, so this is clearly a big moneymaker for cyber-criminals. And while…

Read More

Here's a quick exercise in phishing that anyone can try. Go ahead, give it a shot. In just five minutes – assuming your search skills are halfway decent – you can gather enough information about a high-value target to create your own spear…

Read More

When you think of open source systems available over the ‘net what do you think of?   Apache Tomcat?  Emacs?    How about the F-35 Joint Strike Fighter or the U.S Navy’s Littoral Combat Ship.   Well the last two aren’t technically open source, but according…

Read More

As the manager (and former lead engineer) of the “security intelligence” portions of our Insight product, I’m often tasked with thinking about security in different ways. A big part of that is finding weaknesses in everyday technologies that could be used to exploit…

Read More