Modern SOC (2)

November 8, 2019

3 Ways High-Priority Malware Detection Can Fill SOC Gaps

Given today’s threat landscape, operating an enterprise Security Operations Center (SOC) presents a high-stakes challenges. With modern IT infrastructures comprised of a labyrinth of assets, endpoints, and third-party dependencies, threat actors continue to succeed in infiltrating vulnerable systems with inherently sophisticated, difficult-to-detect malware.
October 25, 2019

Why You Need to Prioritize Software Development and Supply Chain Security

Enterprise software development graduated from the “waterfall” framework of development and operations - and became less linear, more complex and, in several ways, more difficult to secure.
October 9, 2019

How to Detect Supply Chain Attacks

What is a software supply chain? Simply put, the software supply chain is the entire lifetime of a software.
August 15, 2019

Top Ways to Get More Value From Your EDR

4 Ways to Optimize Your #EDR with #TitaniumPlatform and Deliver Better Security Content to Your Analysts. Read How to Get More Value From Your #EDR
August 9, 2019

How Detecting High Priority Malware will Accelerate Quality App Development and Release

When it comes to malware's persistent threat to your business, we typically discuss risk in context to failed compliance with regulations, or we talk about data loss, or we focus on fears around business continuity. But internal application quality and the software supply chain are often left out of the conversation — likely because the risk remains somewhat ambiguous.
August 7, 2019

What Are Supply Chain Attacks? How to Protect Your Software Lifecycle

Traditional supply chain attacks impact the production of physical goods. Your supply chain might include partners delivering raw materials, component parts used in manufacturing, as well as distribution of finished goods.Disruption of that supply chain could result in production shutdowns, aging inventory, degraded partner relations, and financial loss.
July 26, 2019

Automated Static Analysis vs. Dynamic Analysis - Better Together?

Dynamic File Analysis is undoubtedly a vital tool for cyber defense, but its utility as malware analysis technology continues to increase in sophistication.


Sign up now to receive notifications for the ReversingLabs Blog

Request a DEMO

Request a live demo today for a walkthrough of how ReversingLabs detects and analyzes more hidden threats, built to evade security controls—and how we do it faster than anyone else.