1. RSA 2019 in Review

    Tim Roddy |

    I think it’s safe to say that we’re collectively taking a big breath and recovering from another monstrous RSA. This year we saw the theme ‘Better’ take over the show – encouraging us all to consider how cybersecurity can improve and how organizations can better their own security outc … READ MORE

  2. Fidelis Announces First of its Kind Platform Enhancements

    Sam Erdheim |

    Today we are thrilled to announce an upcoming Fidelis Elevate release which will see the platform become the first of its kind to enable organizations to not only calculate their vulnerable attack surface, but also respond effectively to these insights to build a robust defense. Fidelis Elevate … READ MORE

  3. CRN 100 List

    Fidelis Recognized on CRN’s 2019 Security 100 List

    Sam Erdheim |

    We’re excited to announce that today CRN®, a brand of The Channel Company, has named Fidelis Cybersecurity on its annual Security 100 list, for the third year running. The Security 100 list recognizes the coolest security vendors in each of five categories: Endpoint Security; Identity Managem … READ MORE

  4. Hunting ATT&CKs: A Framework for Success

    Justin Swisher |

    Threat Hunting. MITRE ATT&CK. These words have been thrown around, mashed together, and forced upon the cyber security world en masse lately. There is no shortage of blogs on each, or on the combination of both – trying to explain them, define them, or show how they matter to every organization … READ MORE

  5. Threat Landscape

    Building a Terrain-Based Defense Strategy

    Dr. Abdul Rahman |

    Not who, not how…but where Across the globe, organizations are being attacked by well-funded hacking groups who succeed in breaching traditional perimeter defenses. These attacks serve to remind us that we can no longer rely entirely on preventive security measures. The reality is that if a gr … READ MORE

  6. Shabak Challenge

    Solving Cyber-Crimes as Agent A

    Rami Mizrahi |

    Spoiler alert! In this blog, I’ll be outlining our approach to solving a cyber challenge that has been posted by the Israeli Secret Service (Shabak). This is not a traditional hacking challenge, but rather focuses on software engineering and data science. The Israel Secret Service, Shabak, try … READ MORE

  7. Insider Threats: Are you prepared for the bad apple?

    Louis Smith |

    In last week’s blog I explained what Insider Threats were, and why organizations should be taking the risk that they pose seriously. This week I’ll be explaining how the organization should approach the issue of insider threat and how you can take the first steps to assessing your level of I … READ MORE

  8. Insider Threat

    Don’t Judge a Book by its Cover: What are Insider Threats? Why Should we Take Them Seriously?  

    Louis Smith |

    Last year we saw a spate of high-profile cyber security breaches that all had one thing in common – they originated from a malicious insider. As cybersecurity professionals, its easy to become so focused on the external threats that we can often forget the threat whocould be sitting right besi … READ MORE

  9. Security Predictions from the Magic 8 Ball

    Danny Pickens |

    With the end of each year, security professionals break out their crystal balls to estimate what will be the industry’s trends for the coming year. To break this tradition, I decided to not ask my crystal ball, but my magic 8 ball. This post will cover some of the trends that we can look forwar … READ MORE