<img src="https://ws.zoominfo.com/pixel/JrRu3vUM8j33QSR7Bwxw" width="1" height="1" style="display: none;">


December 13, 2018

Machine Learning: A Belt and Suspenders Approach

A belt and suspenders strategy won't win you any fashion awards, but it can save you from embarrassingly being caught with your pants down in a successful cyber-attack. However, unlike wearing two devices to hold up your pants, cybersecurity professionals can combine overlapping technologies to provide significant synergies that exceed the sum of their parts. That makes a belt and suspenders approach a sound strategy for cybersecurity.
August 2, 2018

Why Build a Local Threat Intelligence Infrastructure with Automated Static Analysis?

At a recent FS-ISAC event, I listened to a cybersecurity analyst explain that a majority of the global (external) threat intelligence he receives is useless for his organization.
June 14, 2018

A Risk Not Worth Taking

Company’s are putting their data at risk by using VirusTotal, even when safer, superior options exist
March 7, 2018

Static File Analysis - A critical tool in your malware detection toolkit

A new generation of security focused tools are entering the market
February 6, 2018

Sifting Files for Cyber

Guest blog by Edvard Amoroso, Founder and CEO of TAG Cyber