<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">
Cybereason + Arm: Securing The Core of IoT
LEARN MORE →
Securing IoT
LEARN MORE →

7 Best Movies About Cybersecurity and Hacking

Cybersecurity

7 Best Movies About Cybersecurity and Hacking

Most films about cybersecurity over-fictionalize or idolize hackers, cyber attacks, and cyber crime. While some of our favorite movies mix action and suspense with the cyber realm, we've chosen to feature a small selection that are both authentic and entertaining.

Attackers use botnets to break into networks faster

Research

Attackers use botnets to break into networks faster

No one likes grunt work, including attackers, who have turned to bots to automatically handle menial tasks like exploiting vulnerabilities. If exploit automation wasn’t enough of a concern for security teams, this technique has grown even more potent with attackers using bots that can automatically exploit vulnerabilities, create backdoors, dump passwords, conduct network reconnaissance, and laterally move in seconds.

Cybereason CISO Interview Series: It’s only information security (but I like it)

Cybersecurity

Cybereason CISO Interview Series: It’s only information security (but I like it)

Sometimes the career path to security and IT leadership doesn’t involve an undergraduate degree in computer science. Sometimes reaching the ranks of CIO and CISO involves an English degree and a desire to play rock-and-roll for a living.

Kim Kowtows: Attempting to build a hub and spoke negotiation while still staying deferential

Nation-state Attack

Kim Kowtows: Attempting to build a hub and spoke negotiation while still staying deferential

Kim Jong-un is seeking to subvert the six-party talks paradigm with a hub-and-spoke model that places North Korea at the center of all negotiations.

ESG Solution Showcase: The Cybereason Endpoint Security Platform

Endpoint Detection and Response

ESG Solution Showcase: The Cybereason Endpoint Security Platform

An ESG report outlines how Cybereason meets the requirements for a next-generation endpoint security platform by delivering protection through NGAV and endpoint detection and response.

Trade war could motivate China to trade hide and bide for attack and retaliate against US companies

Cybersecurity

Trade war could motivate China to trade hide and bide for attack and retaliate against US companies

China has substantially decreased cyberattacks against U.S. companies in recent years. But that doesn't mean the threat has disappeared. China just needs a reason to ramp up attacks. And a trade war could serve as that catalyst.

What are Supply Chain Attacks?

Cybersecurity

What are Supply Chain Attacks?

A supply chain attack aims to damage an organization by targeting less secure elements in its supply network. Exploiting a service provider's supply chain, data supply chain or traditional manufacturer supply chain has been seen in a litany of major data breaches in the past few years.

4 Things to Consider When Assessing NGAV Solutions

Next Generation Antivirus

4 Things to Consider When Assessing NGAV Solutions

Before you purchased a NGAV tool, here are four points to consider.

Negotiations Alter North Korea’s Hacking Threat

Cybersecurity

Negotiations Alter North Korea’s Hacking Threat

The upcoming talks between the U.S., South Korea and North Korea could see the DPRK change its hacking tactics to focus more on espionage campaigns against the U.S. in an attempt to figure out how the Trump administration will approach the potential meeting.

Ransomware: Down but by no means out

NotPetya

Ransomware: Down but by no means out

In this blog, Ross Rustici, Cybereason’s Senior Director for Intelligence Services, debunks a few common ransomware myths, talks about what other threats attackers may use instead and explains why organizations still need to remain vigilant against ransomware.