<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Why is Emotet So Popular and Who is it Targeting Now?

Insights

Why is Emotet So Popular and Who is it Targeting Now?

The malware previously described by DHS as the most destructive ever is surging yet again. Why is Emotet so popular and who is it targeting now?

6 of the Best Malicious Life Cybersecurity History Stories from 2019

Insights

6 of the Best Malicious Life Cybersecurity History Stories from 2019

To close out the year and celebrate seventy episodes of Malicious Life, we’re listing the best cybersecurity podcast episodes we’ve released in 2019.

Is Cyber Retaliation from Iran Imminent?

Insights

Is Cyber Retaliation from Iran Imminent?

We are three days into 2020, and the world is already on high alert. Yesterday evening, the US government killed prominent Maj. Gen. Qasem Soleimani in an overnight airstrike at the Baghdad airport.

Mobile Malware: From Consumer Fraud to Enterprise Espionage

Insights

Mobile Malware: From Consumer Fraud to Enterprise Espionage

The data is telling us that it’s time to secure mobile, and yet our understanding of these threats is severely lacking.

How Geopolitical Events Will Change Cybersecurity in 2020

Cybersecurity

How Geopolitical Events Will Change Cybersecurity in 2020

As we enter the New Year, we need to keep in mind how nation state evolution, new targets, and security vendor stagnation will serve as motivation for hackers.

The Timeline to Consolidation of Endpoint Protection Platforms and EDR

Endpoint Detection and Response

The Timeline to Consolidation of Endpoint Protection Platforms and EDR

The endpoint security market is in the midst of a consolidation of EDR and EPP. How did we get here? Read on to find out.

Use SIEM and EDR Together to Improve Defenses and Save Money

Cybersecurity

Use SIEM and EDR Together to Improve Defenses and Save Money

Our white paper explores the complementary and interdependent uses of SIEM, SOAR, and EDR technologies. By using these tools in conjunction with clearly defined roles, security operations teams can reduce costs, improve security, and assist human intelligence in a repeatable, reliable way.

Defensive Gap Assessment with MITRE ATT&CK

MITRE ATT&CK Framework

Defensive Gap Assessment with MITRE ATT&CK

Our white paper shares five essential stages you should be following to implement a closed-loop, tactical security effort with MITRE ATT&CK. Combining techniques, tactics, and procedures with adversary emulation plans, this white paper gives you background to build an effective, iterative defense.

MITRE ATT&CK Evaluations Prove Cybereason Best Enables Defenders to Avoid Material Harm

MITRE ATT&CK Framework

MITRE ATT&CK Evaluations Prove Cybereason Best Enables Defenders to Avoid Material Harm

The Cybereason Defense Platform has been evaluated by MITRE to show how we approach threat detection in the context of the MITRE ATT&CK framework. Check out how we did.

What the government shutdown of 2019 meant for our collective cybersecurity

Insights

What the government shutdown of 2019 meant for our collective cybersecurity

After five weeks, the partial U.S. government shutdown of 2019 just came to a close. In its wake comes a pinch of American labor and a delay in federal employees receiving their salaries. Additionally, transportation security and other vital federal services exhibited the strain of the prolonged impasse in Washington, D.C. During this time, cyber readiness emerged as a hot conversation topic for fear of a potentially devastating cyber attack.