Oct 2016

  1. Monday, October 31, 2016
    Metadata gathered from your network can be a powerful ally in the battle against cyberattacks. In fact, you can do seemingly impossible things with the right metadata. In Part 1 , we explored how metadata can help you spot phishing emails, find man-in-the-middle attacks, locate weak encryption and... READ MORE
  2. Thursday, October 27, 2016
    Bloomberg reporter Jordan Robertson recently sat down with Fidelis Cybersecurity Senior VP Mike Buratowski to discuss the malware and other data that attackers used to pull off the breach of the Democratic National Committee’s (DNC) servers. By examining the clues the attackers left behind, Mike... READ MORE
  3. Wednesday, October 26, 2016
    Network Intrusion Prevention Systems have been a mainstay of the network security stack for well over a decade. When they first entered the mainstream in the early 2000s, the iPhone hadn't been invented. We were still in the age of the PalmPilot (anyone remember using that stylus?). But, at the... READ MORE
  4. Tuesday, October 25, 2016
    Deception and crime go hand in hand. But knowing when you’re being deceived means you need to think like the bad guys and know what to look for. There are three elements of deception. To see these elements in action, we need look no further than a few notable cases -- including the alleged Russian... READ MORE
  5. Monday, October 17, 2016
    Metadata is data that describes other data. And while it may not sound sexy, metadata gathered from your network can be a powerful ally in the battle against cyberattacks. READ MORE
  6. Saturday, October 15, 2016
    In November 2015, the Dyre banking trojan seemingly disappeared overnight surprising security researchers worldwide. Months later it was announced that Russian authorities had arrested most of the gang responsible for its operations . Prior to that, it was a relatively rare act for Russian... READ MORE