September 25, 2019
Malware analysis adapts in response to more complex destructive objects
July 26, 2019
Dynamic File Analysis is undoubtedly a vital tool for cyber defense, but its utility as malware analysis technology continues to increase in sophistication.
June 27, 2019
Automated static analysis is not subject to traditional virtualization and sandbox evasion techniques and takes place in milliseconds, regardless of file type, size, target OS or platform.
December 13, 2018
A belt and suspenders strategy won't win you any fashion awards, but it can save you from embarrassingly being caught with your pants down in a successful cyber-attack. However, unlike wearing two devices to hold up your pants, cybersecurity professionals can combine overlapping technologies to provide significant synergies that exceed the sum of their parts. That makes a belt and suspenders approach a sound strategy for cybersecurity.
August 2, 2018
At a recent FS-ISAC event, I listened to a cybersecurity analyst explain that a majority of the global (external) threat intelligence he receives is useless for his organization.