How a Lower Maturity Security Organization Can Use Threat Intel?
by Anton Chuvakin | May 16, 2016
As we mentioned, we are starting a refresh effort for our threat intelligence paper [Gartner GTP access required]. One thing we may add is more detailed guidance on the usage...
New Research Starting Soon: Threat Intel, SOC, etc
by Anton Chuvakin | May 11, 2016
Our EDR research is winding down, so we are about to start our next cycle, here is what we have in mind.
THREAT INTELLIGENCE TOPIC: An update to our “How...
Our "Understanding Insider Threats" Paper Publishes
by Anton Chuvakin | May 9, 2016
Very few of you knew that we’ve been “secretly” working on a report dedicated to the insider threat – for the last year or so. We had a few false...
Highlights From Verizon Data Breach Report 2016
by Anton Chuvakin | May 4, 2016
Here are my favorite “data-bits”, quotes and fun items from Verizon's 2016 Data Breach Investigations Report:
“The Actors in breaches are predominantly external. While this goes against InfoSec folklore, the...
One More Time On EDR Use Cases
by Anton Chuvakin | May 3, 2016
Our first EDR paper is about to be published, but I wanted to draw your attention to my favorite topic – the use cases.
We touched on the EDR (back...
EDR Tool Wins - Only For The Enlightened?
by Anton Chuvakin | April 25, 2016
We are nearing the end of our Endpoint Detection and Response (EDR) research project; we just pushed our first paper – on EDR operational practices – into review and are...
Our "How to Plan and Execute Modern Security Incident Response" Publishes
by Anton Chuvakin | April 11, 2016
Our updated security incident response (IR) paper, now renamed “How to Plan and Execute Modern Security Incident Response” (Gartner GTP access required) has just published.
Some fun quotes follow below:...
Speaking at Gartner Security & Risk Management Summit 2016
by Anton Chuvakin | April 8, 2016
Gartner Security & Risk Management Summit 2016 is coming soon and here is my traditional blog post summarizing my speaking at this upcoming event (Washington, DC, June 13-16, 2016).
“How...
Existing Security Best-Practice Can Handle IoT Exposures?? Not Really
by Earl Perkins | April 8, 2016
A recent news article from both a well respected news source and vendor outlined their assurance that IoT security exposures could be taken care of with existing IT-centric security practices...





