<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Increase in Remote Work Spurs Demand for EDR Cybersecurity

Endpoint Detection and Response

Increase in Remote Work Spurs Demand for EDR Cybersecurity

With the sudden increase in telework, the traditional approach of reacting to cyber threats and security issues only after a breach is discovered is no longer sufficient.

4 Challenges Faced by Organizations Transitioning to Remote Work

Vulnerabilities

4 Challenges Faced by Organizations Transitioning to Remote Work

During the past few months, many companies have contacted us with various questions and requests about remote security. In our conversations with them, we’ve noticed four key challenges that we wanted to explore.

Post-incident Review and the Big Data Problem

Incident Response

Post-incident Review and the Big Data Problem

Security teams that have accepted the post-breach mindset focus on reducing risk as much as possible through visibility and automation, instead of searching for a one-size-fits-all solution.

What Modern Ransomware Looks Like

Ransomware

What Modern Ransomware Looks Like

Over the past year, we have seen many different types of ransomware attacks evolving, especially evolving into multistage ransomware that not only ransoms data, but also exfiltrates as much data as possible. This blog explores three of the most common modern ransomware attacks we are seeing today. 

UbU: Championing Diversity, Equity, and Inclusion at Cybereason

Insights

UbU: Championing Diversity, Equity, and Inclusion at Cybereason

UbU (“you be you”) is the value that sits front and center at Cybereason. Acceptance of every person is at the heart of who we are as a company.

Cybereason’s Newest Honeypot Shows How Multistage Ransomware Attacks Should Have Critical Infrastructure Providers on High Alert

Ransomware

Cybereason’s Newest Honeypot Shows How Multistage Ransomware Attacks Should Have Critical Infrastructure Providers on High Alert

Earlier this year, Cybereason launched its latest honeypot to analyze the tactics, techniques, and procedures used by state-sponsored groups and cyber crime actors to target critical infrastructure providers.

How I made my company’s office into a fancy internet cafe and why should you too

Cybereason

How I made my company’s office into a fancy internet cafe and why should you too

In this article I describe a security strategy that helped my organization avoid this scenario by simply ignoring the perimeter, making us indifferent to the location our employees are working from.

What are Adversary Emulation Plans?

MITRE ATT&CK Framework

What are Adversary Emulation Plans?

Though AEPs are especially important when testing and building a strong defense, they are often overlooked for TTPs by security practitioners versed in the “trench warfare” of day-to-day security operations.

Why Not Detect Every TTP in the MITRE ATT&CK Framework?

MITRE ATT&CK Framework

Why Not Detect Every TTP in the MITRE ATT&CK Framework?

One could argue that, if you can detect all the TTPs in ATT&CK, you should also be able to defend against all of the adversaries in ATT&CK. While technically true, many TTPs are not inherently malicious. 

IOCs vs. IOBs

Malware

IOCs vs. IOBs

IOCs are valuable when preventing known malware, but over 350,000 new strains of malware are detected every day, and fileless malware attacks are on the rise. IOCs are no longer an innovative or sufficient standalone method for defense.