Category: Uncategorized

Disrupting the Cyber Kill Chain: How to Contain Use of Tools and Protocols

Preventing lateral movement and unauthorized domain access due to the misuse of network credentials - especially due to reconnaissance tools...
Read Now

Shopping for a Cyber Security Product? 7 Tips to Help You Get What You Need.

It’s increasingly difficult and more complex to be an effective buyer of security products today. Messaging and content overlaps are...
Read Now

No More Paralysis by Analysis: How Security is Evolving to Real-Time Outcomes

A well-known CISO customer was recently telling me about his experience with implementing new security solutions. His consistent feeling? Dread...
Read Now

It’s 2018. How does Silicon Valley think about a Series B these days?

With Silicon Valley continuing to lead the nation in VC funding (source: Bloomberg), expectations are clear: invest that funding and...
Read Now

How to Get Control of Your Risk and Paralyze Malware in the Process

Attackers and their malware are increasingly relying on a handful of common tools such as Mimikatz, PsExec, and WMI to...
Read Now