Three Keys to a Reliable Ransomware Defense Strategy

As we noted in a previous blog post, ransomware attacks are becoming more frequent and more costly. Reports reveal that there were 304 million ransomware attacks in 2020 – 62% more than the total number of ransomware attacks for 2019. The estimate… Continue reading Three Keys to a Reliable Ransomware Defense Strategy

Webinar: The Current State and Future Challenges of Security

Join Ed Amoroso, CEO of TAG Cyber and Sam Curry, CSO of Cybereason as they discuss pre-COVID-19 trends, discontinuities, and the outlook based on recent events and challenges in the security industry. Supply Chain weaknesses, Ransomware, the “new … Continue reading Webinar: The Current State and Future Challenges of Security

CrowdStrike + Corelight partner to reach new heights

By Lana Knop, Chief Product Officer, Corelight Through our newly announced partnership with CrowdStrike, Corelight customers will be able to incorporate CrowdStrike’s best-in-class threat intelligence into Corelight Sensors to generate actionable alert… Continue reading CrowdStrike + Corelight partner to reach new heights

MITRE ATT&CK: Cybereason Dominates the Competition

The long-awaited 2020 MITRE ATT&CK evaluations are out! With the MITRE ATT&CK framework now being the standard by which Defenders can measure the effectiveness of various solutions in tracking adversary behavior, cyber vendors are cherry-p… Continue reading MITRE ATT&CK: Cybereason Dominates the Competition

Inside Effective EDR Evaluation Testing

Periodically, I receive requests from customers asking for explanations on why this particular technique or that one doesn’t generate a Malop™ in the Cybereason Defense Platform. Such questions illustrate that there is still a great deal of educat… Continue reading Inside Effective EDR Evaluation Testing

Are TIPs Finally Converging With SIEMs?

When all vendors in a new product category use the same use case to explain their value, I become concerned. About 15 years ago, when bombs were a constant threat in many parts of the world, I heard multiple vendors of intelligent video surveillance e… Continue reading Are TIPs Finally Converging With SIEMs?

Ransomware Decoded: Preventing Modern Ransomware Attacks

Many types of malware silently persist on the network, move laterally, communicate with their C2, or obfuscate their behaviors to prevent detection. In contrast to this, traditional ransomware was all about coming in with a big splash and causing … Continue reading Ransomware Decoded: Preventing Modern Ransomware Attacks

Rise of Double-Extortion Shines Spotlight on Ransomware Prevention

Double extortion is a tactic employed by some ransomware gangs. It begins when a crypto-malware strain steals information stored on a victim’s machine before launching its encryption routine.
The post Rise of Double-Extortion Shines Spotlight on R… Continue reading Rise of Double-Extortion Shines Spotlight on Ransomware Prevention

Cybereason Backs Its Protection with $1 Million Breach Protection Warranty

Every security vendor believes that their product solves a problem and helps customers protect against a breach, exploit, or compromise. However, not every vendor is confident enough in their ability to deliver on that promise to back it up with cash. … Continue reading Cybereason Backs Its Protection with $1 Million Breach Protection Warranty

How far does endpoint detection and response (EDR) take you to complete threat intelligence?

Lots of new cyber vendors are starting up all the time. Crunchbase’s list of top cybersecurity startups  is 1,089 businesses long. What you find is that everyone is specialized in their own particular segment; their own slice of technology to remedy a … Continue reading How far does endpoint detection and response (EDR) take you to complete threat intelligence?