Have you ever experienced that panicked moment when you realize you can’t find your mobile phone? You check your pockets, your car, your couch cushions, but alas the phone is nowhere to be found. When you finally realize you left it on a park bench, it’s long gone. If this has happened to you, don’t […]

There’s a Pinterest-perfect, framed chalkboard that hangs in my kitchen titled “Eats” followed methodically by the days of the week. For three weeks, I carefully planned and prepared each day’s meals meeting my daily promises of chili, turkey and pesto paninis, homemade pizza, tacos, and so on. It was impressive. Until it wasn’t. Soon, my […]

This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook.  In our first post, we examined the evolution of the botnet. In this follow-up we will discuss a new botnet operating model that allows an attacker to get an insider’s view of infected organizations without actually being an insider—all while […]

It doesn’t have to. We just need to apply the compensating safeguards and automated controls selectively so CISOs and their security teams can comfortably embrace it. Although many CISOs see automation as a necessity to deal with limited resources and increasing workloads, there is a lingering reticence to adopt it widely because their security staff […]

This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook.  Want to spread malware? One of the most effective ways is to use a botnet, a network of infected systems. The goals of botnets have barely changed since we first encountered them more than a decade ago. We […]