Blog

Get the latest research, expert insights, and security industry news.

Sign Up for Updates

Vulnerabilities Aug 3, 2020

4 Challenges Faced by Organizations Transitioning to Remote Work

During the past few months, many companies have contacted us with various questions and requests about remote security. In our conversations with them, we’ve noticed four key challenges that we wanted to explore.

Read More
Cybersecurity Apr 6, 2020

3 Straightforward Ways to Build a SOC

When trying to address the question “Is my SOC as effective as possible?”, one of the most challenging components you will face is staffing. In this blog, I'll be covering how to answer some of the more difficult questions when it comes to building a SOC.

Read More
Endpoint Detection and Response Oct 7, 2019

5 Capabilities of a Modern Endpoint Protection Platform

In order to address the evolving threat landscape, the security industry has turned to more comprehensive endpoint protection platforms. What are they?

Read More
Malware Sep 17, 2019

Fileless Malware 101: Understanding Non-Malware Attacks

Unlike file-based attacks, fileless malware abuses legitimate tools to carry out attacks. Read about it with examples from real attacks now.

Read More
Antivirus Sep 16, 2019

Explaining Fileless Malware Succinctly with Examples from our Research

In Q1 2018, fileless attacks were up 94%. Learn about what fileless malware is with common examples from the Cybereason Nocturnus team's research.

Read More
Threat Hunting Apr 24, 2019

How to Generate a Hypothesis for a Threat Hunt

Many find the process of threat hunting to be too demanding. What techniques do you use to hunt? Where do you even begin?

Read More
MITRE ATT&CK Framework Mar 19, 2019

Delayed Detections in MITRE ATT&CK: What Do They Mean for a Business?

During the recent MITRE evaluations, it became apparent that many security vendors, while able to detect threats, were doing so well after the fact. It's important to consider what these delayed detections would mean for a SOC experiencing a real breach.

Read More
MITRE ATT&CK Framework Dec 20, 2018

The Round I MITRE ATT&CK Product Evaluations: A Guide By Security Experts

The MITRE ATT&CK framework is a complex solution to a complex problem. Rather than simply scoring vendors on a linear scale, it offers a more profound view of capabilities, applicability, and use-case. This is what you need to know about the way MITRE uses ATT&CK to evaluate security vendors, and how threat hunting factors into the ATT&CK framework.

Read More