22 03, 2018

Endpoint Cyber Security: Any Dwell Time Is Too Much

By |2018-03-25T14:43:21-04:00March 22nd, 2018|Categories: Security|Tags: , , |

The prevailing model of endpoint cyber security is: monitor, detect, and respond. The idea is to find attacks once they’re inside your infrastructure but before they can do any damage. First, learn about attacks from some source and then reduce their dwell time by updating endpoint sensors or patching before a breach. In other words, [...]

26 09, 2017

Two KPIs Essential for Measuring Security Tools

By |2017-09-26T13:33:05-04:00September 26th, 2017|Categories: Blog, Security|Tags: , , |

Last month I discussed cybersecurity effectiveness, particularly in regards to the growing threat of fileless attacks. But effectiveness is only one piece of the equation. First and foremost businesses still need to go about their business. Unfortunately, it has long been the case that the more effective a cybersecurity tool is, the slower and more [...]

29 08, 2017

The Question of Advanced Attack Protection – Reframed

By |2017-09-28T13:34:06-04:00August 29th, 2017|Categories: Blog, Security|Tags: , , |

Arthur Braunstein is VP US Sales at Morphisec Getting good answers and outcomes often depends on asking the right question. The following question recently crossed my desk: “What is the best tool for detecting advanced cyberattacks, including fileless attacks?” Asked like this, the question suggests the only way to protect yourself from advanced [...]

Go to Top