1. Fidelis Topspin Acquisition

    Fidelis Acquires Adaptive Deception Company TopSpin

    Today we announced the acquisition of TopSpin Security, an intelligent deception security vendor. We’re extremely excited about bringing the TopSpin DECOYnet technology and expertise into the Fidelis family. Automated Detection & Response Gets Deception TopSpin was recognized by Gartner as a 20 … READ MORE

  2. Fidelis Elevate ADR Blog

    What is Fidelis Elevate and Why Does ADR Matter?

    The Problem: Modern attacks are a complex and often automated series of processes, steps and interrelated events that penetrate the cybersecurity perimeter. They combine automated attacks at scale with more targeted attacks both simultaneously and continuously. Additionally, the toolsets for achi … READ MORE

  3. Fidelis at BSides DC 2017

    2017 Security B-Sides DC

    The foundation of Security B-Sides was predicated on individuals within the information security community who wanted to participate within their industry, sharing thoughts and ideas with other passionate InfoSec professionals, while creating a sense of community and stewardship for their collec … READ MORE

  4. Fidelis and the New Metrics of Security Operations

    The New Metrics of Security Operations: Tracking [R]evolutionary Improvement In Efficiency and Effectiveness with Automated Detection & Response (ADR)

    CISOs have become leaders in their businesses rather than just experts in their departments. As a result, they face three new requirements: To educate their peers on the scope, scale, severity and solutions for cybersecurity and how emerging threats affect each aspect of the business. To eleva … READ MORE

  5. How Security Metrics Deliver Business Value & Compliance

    Metrics are tangible values that quantify progress towards a goal. An analytic system combines metrics from numerous sources to assist CISOs and their peers to understand trends and patterns. Metrics play a key role in a larger analytics system. As integral as cybersecurity is to business operat … READ MORE

  6. Emotet Evolution: The Spreader Gets Integrated

    Emotet Evolution: The Spreader Gets Integrated

    Introduction On July 19, 2017 we wrote about the incorporation of a spreader component into the popular Emotet downloader. Just a short while later, a volume spam campaign was initiated that delivered Emotet with further modifications from the samples that we had analyzed. This post documents th … READ MORE

  7. Decrease well time

    The biggest challenge to reduce dwell-time might surprise you

    This is part of a Black Hatinterview with Hardik Modi, Vice President Threat Intelligence thatoriginally ran on https://www.blackhat.com/sponsor-interview/05262017.html#fidelis Question: Organizations are under increasing pressure to improve incident detection and to reduce dwell-times. What are … READ MORE

  8. When to Decrypt

    When to Decrypt and What to Decrypt For Cyber Security

    This is part of a Black Hatinterview with Hardik Modi, Vice President Threat Intelligence thatoriginally ran on https://www.blackhat.com/sponsor-interview/05262017.html#fidelis Question: There's been a push to encrypt everything on the Internet in recent years. How are threat actors exploiting t … READ MORE

  9. Emotet takes wing with a spreader

    Emotet takes wing with a spreader

    Introduction: The recent Wannacry and Petya outbreaks have demonstrated the potency of ransomware coupled with a propagation component (spreader). While typical ransomware infections lead to the denial of access of data on a single victim system, it becomes an enterprise threat when it can propa … READ MORE