<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Valak: More than Meets the Eye

Malware

Valak: More than Meets the Eye

The Valak Malware is a sophisticated malware that can steal enterprise mailing information and passwords along with the enterprise certificate. This has the potential to access critical enterprise accounts, causing damage to organizations, brand degradation, and ultimately a loss of consumer trust. 

Love Your Enemies Before You Destroy Them — Hacking for Good

Cybersecurity

Love Your Enemies Before You Destroy Them — Hacking for Good

Proactive defense is about predicting, understanding, and preventing as many moves as possible that an attacker could make against you. You have to stay a step ahead of the enemy and lure them into a trap of your own.

IOCs vs. IOBs

Malware

IOCs vs. IOBs

IOCs are valuable when preventing known malware, but over 350,000 new strains of malware are detected every day, and fileless malware attacks are on the rise. IOCs are no longer an innovative or sufficient standalone method for defense. 

Why a Cloud-native EPP is Critical for Futureproof Security Operations

Endpoint Protection Platform

Why a Cloud-native EPP is Critical for Futureproof Security Operations

Among endpoint solutions, there’s a staggeringly clear distinction between solutions that are cloud-native and those whose cloud capabilities are either non-existent or partial at best.

Legacy A/V Is So Last Year

Next Generation Antivirus

Legacy A/V Is So Last Year

Since the acquisition of Symantec in September, Cybereason has received a flood of requests from concerned customers interested in making the switch to Cybereason.

What is the MITRE ATT&CK Framework?

MITRE ATT&CK Framework

What is the MITRE ATT&CK Framework?

MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (MITRE ATT&CK) is a model and knowledge base of adversary behavior that has become a staple of the endpoint security space.

Is On-Premise For Endpoint Protection Still A Thing?

Endpoint Protection Platform

Is On-Premise For Endpoint Protection Still A Thing?

At Cybereason, we want to assure our customers and prospects that we support various on-premise deployment options to address their entire endpoint protection security needs.

To Pay or Not to Pay

Ransomware

To Pay or Not to Pay

It might be appealing to have a clear-cut, black-and-white measure for when to talk or when to shut down talks; but the nuances of when it makes sense to enter into negotiations and when it makes sense to pay ransoms for hostages or not is not as straightforward as a five-word policy.

Converging Endpoint and Mobile Security

Insights

Converging Endpoint and Mobile Security

In this blog, I'll be exploring the traditional approaches to protecting and managing both endpoint and mobile devices and identify how both approaches have evolved.

2 Metrics to Evaluate MITRE ATT&CK Results

MITRE ATT&CK Framework

2 Metrics to Evaluate MITRE ATT&CK Results

Ultimately, the goal of MITRE ATT&CK and other product evaluations is to identify which products can best contain attacks and provide you with actionable threat detection to reduce overall Mean Time To Respond.