June 27, 2019
Automated static analysis is not subject to traditional virtualization and sandbox evasion techniques and takes place in milliseconds, regardless of file type, size, target OS or platform.
December 13, 2018
A belt and suspenders strategy won't win you any fashion awards, but it can save you from embarrassingly being caught with your pants down in a successful cyber-attack. However, unlike wearing two devices to hold up your pants, cybersecurity professionals can combine overlapping technologies to provide significant synergies that exceed the sum of their parts. That makes a belt and suspenders approach a sound strategy for cybersecurity.
August 2, 2018
At a recent FS-ISAC event, I listened to a cybersecurity analyst explain that a majority of the global (external) threat intelligence he receives is useless for his organization.