There’s a Pinterest-perfect, framed chalkboard that hangs in my kitchen titled “Eats” followed methodically by the days of the week. For three weeks, I carefully planned and prepared each day’s meals meeting my daily promises of chili, turkey and pesto paninis, homemade pizza, tacos, and so on. It was impressive. Until it wasn’t. Soon, my […]

This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook.  In our first post, we examined the evolution of the botnet. In this follow-up we will discuss a new botnet operating model that allows an attacker to get an insider’s view of infected organizations without actually being an insider—all while […]

It doesn’t have to. We just need to apply the compensating safeguards and automated controls selectively so CISOs and their security teams can comfortably embrace it. Although many CISOs see automation as a necessity to deal with limited resources and increasing workloads, there is a lingering reticence to adopt it widely because their security staff […]

This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook.  Want to spread malware? One of the most effective ways is to use a botnet, a network of infected systems. The goals of botnets have barely changed since we first encountered them more than a decade ago. We […]

The holiday season is upon us, and for many its time to stock up on gifts. Seasonal sales are eagerly anticipated – so much so, that you may have both Black Friday and Cyber Monday highlighted on your calendars. So what should you know as you ready your wallet in the coming weeks? It turns […]