Oct 2016

  1. Ten Impossible Things You Can Do with Metadata, Part 2

    Monday, October 31, 2016
      Metadata gathered from your network can be a powerful ally in the battle against cyberattacks. In fact, you can do seemingly impossible things with the right metadata. In Part 1, we explored how metadata can help you spot phishing emails, find man-in-the-middle attacks, locate weak encryption... READ MORE
  2. Podcast: How Experts Traced the DNC Hack to Russian Spies

    Thursday, October 27, 2016
    Bloomberg reporter Jordan Robertson recently sat down with Fidelis Cybersecurity Senior VP Mike Buratowski to discuss the malware and other data that attackers used to pull off the breach of the Democratic National Committee’s (DNC) servers. By examining the clues the attackers left behind, Mike... READ MORE
  3. Would You Re-Hire Your IPS Today?

    Wednesday, October 26, 2016
      Network Intrusion Prevention Systems have been a mainstay of the network security stack for well over a decade. When they first entered the mainstream in the early 2000s, the iPhone hadn't been invented. We were still in the age of the PalmPilot (anyone remember using that stylus?). But, at the... READ MORE
  4. The Anatomy of Good Deception

    Tuesday, October 25, 2016
      Deception and crime go hand in hand. But knowing when you’re being deceived means you need to think like the bad guys and know what to look for. There are three elements of deception. To see these elements in action, we need look no further than a few notable cases -- including the alleged... READ MORE
  5. Ten Impossible Things You Can Do with Metadata, Part 1

    Monday, October 17, 2016
    Quick! What do you do when you think you’ve been compromised? It’s not a trick question (or the beginning of a bad joke). To investigate, you’d probably look for historical information that you could easily put your hands on. Usually that means pulling logs and NetFlow data to try and understand... READ MORE
  6. TrickBot: We Missed you, Dyre

    Saturday, October 15, 2016
    In November 2015, the Dyre banking trojan seemingly disappeared overnight surprising security researchers worldwide.  Months later it was announced that Russian authorities had arrested most of the gang responsible for its operations.  Prior to that, it was a relatively rare act for Russian... READ MORE