1. Fidelis at BSides DC 2017

    2017 Security B-Sides DC

    The foundation of Security B-Sides was predicated on individuals within the information security community who wanted to participate within their industry, sharing thoughts and ideas with other passionate InfoSec professionals, while creating a sense of community and stewardship for their collec … READ MORE

  2. Fidelis and the New Metrics of Security Operations

    The New Metrics of Security Operations: Tracking [R]evolutionary Improvement In Efficiency and Effectiveness with Automated Detection & Response (ADR)

    CISOs have become leaders in their businesses rather than just experts in their departments. As a result, they face three new requirements: To educate their peers on the scope, scale, severity and solutions for cybersecurity and how emerging threats affect each aspect of the business. To eleva … READ MORE

  3. How Security Metrics Deliver Business Value & Compliance

    Metrics are tangible values that quantify progress towards a goal. An analytic system combines metrics from numerous sources to assist CISOs and their peers to understand trends and patterns. Metrics play a key role in a larger analytics system. As integral as cybersecurity is to business operat … READ MORE

  4. Emotet Evolution: The Spreader Gets Integrated

    Emotet Evolution: The Spreader Gets Integrated

    Introduction On July 19, 2017 we wrote about the incorporation of a spreader component into the popular Emotet downloader. Just a short while later, a volume spam campaign was initiated that delivered Emotet with further modifications from the samples that we had analyzed. This post documents th … READ MORE

  5. Decrease well time

    The biggest challenge to reduce dwell-time might surprise you

    This is part of a Black Hatinterview with Hardik Modi, Vice President Threat Intelligence thatoriginally ran on https://www.blackhat.com/sponsor-interview/05262017.html#fidelis Question: Organizations are under increasing pressure to improve incident detection and to reduce dwell-times. What are … READ MORE

  6. When to Decrypt

    When to Decrypt and What to Decrypt For Cyber Security

    This is part of a Black Hatinterview with Hardik Modi, Vice President Threat Intelligence thatoriginally ran on https://www.blackhat.com/sponsor-interview/05262017.html#fidelis Question: There's been a push to encrypt everything on the Internet in recent years. How are threat actors exploiting t … READ MORE

  7. Emotet takes wing with a spreader

    Emotet takes wing with a spreader

    Introduction: The recent Wannacry and Petya outbreaks have demonstrated the potency of ransomware coupled with a propagation component (spreader). While typical ransomware infections lead to the denial of access of data on a single victim system, it becomes an enterprise threat when it can propa … READ MORE

  8. From Detection to Remediation: A Case Study with RIG

    From Detection to Remediation: A Case Study with RIG

    Recently, our partner Exatel published its latest research project outlining its investigation following an alert from Fidelis Network, which identified a RIG exploit kit traffic traversing a network. This isn’t interesting, per se, as exploit kit traffic is common in most environments. What ma … READ MORE

  9. Fidelis At Black Hat 2017

    Fidelis at Black Hat 2017: See you in Vegas!

    We're gearing up for Black Hat USA 2017. As you pack your bags and plan ahead, be sure to check out Fidelis – we’ve got demos, advanced technology and smart people. We’re also your stop for cool swag (hint hint!). Oh yeah, and we have pinball. Here’s a look ahead at what we’ll be up to … READ MORE