<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Is On-Premise For Endpoint Protection Still A Thing?

Endpoint Protection Platform

Is On-Premise For Endpoint Protection Still A Thing?

At Cybereason, we want to assure our customers and prospects that we support various on-premise deployment options to address their entire endpoint protection security needs.

To Pay or Not to Pay

Ransomware

To Pay or Not to Pay

It might be appealing to have a clear-cut, black-and-white measure for when to talk or when to shut down talks; but the nuances of when it makes sense to enter into negotiations and when it makes sense to pay ransoms for hostages or not is not as straightforward as a five-word policy.

Converging Endpoint and Mobile Security

Insights

Converging Endpoint and Mobile Security

In this blog, I'll be exploring the traditional approaches to protecting and managing both endpoint and mobile devices and identify how both approaches have evolved.

2 Metrics to Evaluate MITRE ATT&CK Results

MITRE ATT&CK Framework

2 Metrics to Evaluate MITRE ATT&CK Results

Ultimately, the goal of MITRE ATT&CK and other product evaluations is to identify which products can best contain attacks and provide you with actionable threat detection to reduce overall Mean Time To Respond.

EventBot: A New Mobile Banking Trojan is Born

Research

EventBot: A New Mobile Banking Trojan is Born

The Cybereason Nocturnus team is investigating EventBot, a new type of Android mobile malware. EventBot abuses accessibility features to steal user data from financial applications, read user SMS messages, and steal SMS messages to allow the malware to bypass two-factor authentication. 

Smart Filtering, Smart Sampling and Smart Scaling

Research

Smart Filtering, Smart Sampling and Smart Scaling

In security data analysis, hunting and AI-driven automated detection, the quality of your results depends heavily on the quality of your data. In this blog, I’d like to discuss a few strategies for handling the data and the advantages and disadvantages of each approach.

Cybereason Mobile: Another Step Towards Our Vision to Protect it All

Endpoint Protection Platform

Cybereason Mobile: Another Step Towards Our Vision to Protect it All

Today, we take another step towards our vision to protect it all by releasing a new offering to defend mobile devices: Cybereason Mobile.

MITRE ATT&CK Evaluations Showcase Cybereason’s Detailed Context and Visibility

Endpoint Protection Platform

MITRE ATT&CK Evaluations Showcase Cybereason’s Detailed Context and Visibility

Today, we are happy to announce that the Cybereason Defense Platform has been evaluated by MITRE ATT&CK to illustrate how we approach threat detection in the context of the MITRE ATT&CK framework.

Understanding the MITRE ATT&CK APT29 (Round 2) Product Evaluations

MITRE ATT&CK Framework

Understanding the MITRE ATT&CK APT29 (Round 2) Product Evaluations

Get a refresher on the MITRE ATT&CK APT29 Evaluations.

Q&A: Maintaining Secure Business Continuity with Lior Div

Insights

Q&A: Maintaining Secure Business Continuity with Lior Div

I have been actively counseling CEOs on how best to secure business continuity during this difficult time, and wanted to make those recommendations available to everyone.