New Research Paper: Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem
Detection of malware is a constant battle between the technologies designed to detect and prevent malware and the authors creating them. One common technique adversaries leverage is packing binaries. Packing an executable is similar to applying compression or encryption and can inhibit the ability of some technologies to detect the packed malware. High entropy is […]
Cyber Threat Alliance Releases Cryptomining Whitepaper
Despite the recent devaluation of some cryptocurrencies, illicit cryptocurrency miners remain a lucrative and widespread attack vector in the threat landscape. These miners are easy to deploy, and attackers see...
From motorcycles to manufacturing: Using data as your competitive advantage
This month marks the 50th anniversary of Burt Munro setting the land speed record on a motorcycle. Munro used a 1920, 1,000 CC Indian motorcycle at the Bonneville Salt Flats in Utah to set a record of 184.087 mph—a record that stands unbroken for its class to this very day. He was 68 years old […]
It’s Time to Rethink the Value of “Support”
A company with $2 Billion in annual revenue and 20,000 users maintains their network with less effort, resulting in 120% ROI. How? Automated capabilities manage your infrastructure in three ways.
New White Paper from Enterprise Strategy Group on the Evolution of and Need for Secure Network Access
Mention Network Access Control (NAC) to some security or network operations engineers, and they just might grimace. Why? Most people still associate NAC with a set of technologies that were complicated to deploy and implement effectively. Today, however, those nightmare assumptions are far removed from the reality. In this newly released white paper, Jon Oltsik, […]