Blog

Five IT Security Vulnerabilities that Threaten Your Business

A closer look at some of the most common network security vulnerabilities that exist today … and how endpoint modeling can help protect against the threats they represent.

Continue Reading

Three Commonly Ignored Signs of a Cyber Attack

Learn the first three signs of cyber attack, and how endpoint modeling can help your organization act quickly to minimize damage and protect data.

Continue Reading

St. Louis Cardinals “Hackgate” is a Security “Swing-and-Miss”

Recently, we’ve been thinking about the possible St. Louis-Houston Astros network hack, and how Dynamic Endpoint Modeling could have helped.

Continue Reading

Cyber Terrorism: How Safe Are Our Nation’s Ports?

Nearly all of our nation’s goods and services travel by sea. So why aren’t maritime companies more concerned about the threat of cyber attacks? As incidents increase, so does the attention to this critical concern. Endpoint modeling may offer some relief in the near term.

Continue Reading

What You Need to Know About Employees and Free Cloud Storage

From cloud storage to personal thumb drives, employees have a wide variety of options available to them for document storage and sharing. Unfortunately, not all of them provide the level of security your company needs. The question remains: How do you protect your company’s interests?

Continue Reading

Attackers Take Penn State Cyber Security to School

Penn State University officials have confirmed that the institution fell victim to cyber attacks in 2012 and 2014. While social security information is believed to have been safe from compromise, some 18,000 students, faculty, and staff were affected. Universities and healthcare institutions are increasingly vulnerable targets and must take steps to defend against adversaries now.

Continue Reading

Lenovo Security Flaws Remain a Serious Concern

Lenovo recently announced a patch for three security flaws affecting all of their machines, flaws that made them vulnerable to hackers. This is the second vulnerability Lenovo has announced in the last three months, and some question whether or not Lenovo is taking these flaws seriously enough. Endpoint modeling means not having to leave security in the hands of manufacturers.

Continue Reading

Endpoint Modeling May Have Prevented The White House Email Hack

A Closer Look at the White House Email Hack

Last week the White House announced that its email system had been hacked. This made us wonder: Could this attack have been prevented? What can you do to improve your overall security?

Continue Reading

Early Malware Warnings

Network traffic can reveal the subtle indicators of new types of malware. In recent days, we've seen evidence of a new exploit of iOS devices. With passive traffic sensors and dynamic endpoint modeling, we are identifying the presence of malware by detecting domain generation algorithms (DGAs) and analyzing device-level traffic profiles.

Continue Reading