The 3 Security Challenges to Digitizing the NHS

Last year the UK Government set an ambitious target of making the National Health Service (NHS) paperless by 2020, a move that will see hundreds of thousands of patient records digitized. In 2017, hospitals will be obliged to allow patients to view their medical records online, following in the footsteps of the UK’s general practitioners....

Five Cybersecurity Predictions for 2017

To call 2016 ‘eventful’ in the IT Security space would be an understatement. From Mirai to ransomware and NSA shadow brokers to Yahoo!, this year introduced new threats birthed from age-old challenges. Given the unique turbulence of 2016, and the industry’s overall failure to manage and protect networks any better than the years prior, the...

Collaboration is Key to Enhancing Energy Sector’s Cybersecurity

November is National Critical Infrastructure Security and Resilience Month, and there is no better time to highlight the importance of keeping one of our nation’s most critical infrastructures secure: the energy sector. Though we often take it for granted, our way of life depends on the security and stability of our nation’s energy industry. Recent...

Tanium Named to Deloitte Technology Fast 500™

Today we’re thrilled to share Deloitte has named Tanium a Technology Fast 500™ award winner and the 15th fastest-growing technology company in the nation and among the top 10 software companies. The Technology Fast 500 is an award program sponsored by Deloitte to recognize the 500 fastest growing technology, media, telecommunications, life sciences, and energy...

CONVERGE

And that’s a wrap on Tanium CONVERGE16, our inaugural–and sold out!–user conference. We couldn’t be more more grateful to the 450+ customers, partners, and experts from over 170 businesses and government agencies who spent their week in San Francisco with us. As our CEO, Orion Hindawi, wrote when we kicked off the conference, we created CONVERGE...

Introducing Tanium Trends

Our customers frequently tell me how effective Tanium is at managing and securing their network. As Chief of Design and User Experience it’s my job to ensure that all Tanium users, of all skill levels, are able to harness and understand this power and to provide ways to track and communicate the state of their...

Why We CONVERGE

Today we kick off CONVERGE, our inaugural conference in San Francisco. We’re gathering together our customers, team, partners, and technical experts to learn from each other and share how they are readying themselves for the challenges of today and tomorrow. And of course, we wouldn’t invite this many people without some exciting news to share....

Bank of America Merrill Lynch Honors Tanium for Innovation in Enterprise Technology

We are honored to share that Bank of America Merrill Lynch (BofAML) has recognized Tanium for its innovation in enterprise technology, and was chosen as this year’s sole recipient of this distinction at their 8th annual Technology Innovation Summit held in Silicon Valley this week. BofAML selected Tanium as a standout among all enterprise tech...

Broken Cyber Hygiene: A Case Study

With more than 200 different products from 125 vendors to solve the top 20 security controls (deep breath), there’s no shortage of information security tools in the market. Organizations are building defensive arsenals with these tools, but the intruders are still slipping through the digital “doors and windows” left open and unlocked by the organization....

The UK Needs Actions, Not Words, to Encourage Basic Cyber Hygiene

The UK’s newly appointed Minister for the Digital Industries Matt Hancock gave his first speech on cybersecurity last month. Hancock is tasked with managing government policy towards the fast growing digital and creative sectors, ensuring they continue to thrive. Speaking to an audience of businesses he acknowledged that the “vast majority of cyber attacks exploit...

What does Cybersecurity Awareness Mean to You?

At Tanium, awareness is the foundation of what we do: being aware of your entire network, and what’s happening on it, is the first step in building an IT security strategy fit for today’s threat environment. You could say awareness is the first component of cyber hygiene: after you know what’s on your network, you...

The Increasing Popularity of the NIST Cybersecurity Framework

In 2014, the U.S. Commerce Department’s National Institute of Standards and Technology (NIST) created one of the most crucial pieces of cybersecurity guidance called the NIST Cybersecurity Framework, a common denominator for businesses across all industries to better assess risk and enhance the security and resilience of critical infrastructure. The Framework provides both private and...

US Chamber of Commerce Panel Recap: Three Keys to Better Cybersecurity

Credit: Vincent Voci The cybersecurity world faces a unique conundrum. On one hand, cybersecurity is becoming ever more present in our daily lives. Rarely does a week go by when we don’t hear that a major business or government agency has been breached. Today, it’s no longer a matter of if, but when, a breach...

Volume of Breaches Risks Breeding Inaction

Reports appear everyday about the cybersecurity threat facing British businesses. In the last six months alone, the major UK press have written almost 1,000 articles on cybersecurity threats. And it’s no surprise, given two thirds of large UK businesses were hit by a cyber breach or attack in the past year. But with this constant...

Be Ready: The Converge Countdown Begins

Be Ready. What does that simple command mean to you? Concern? Confidence? Or maybe it reminds you of the running to-do list you have, but never seem to finish? At Tanium, “Be Ready” means being prepared for a future that requires a new strategy and the technology to execute at speed and scale. It’s what...

Five Ways the Health Care Industry can Improve its Cyberhealth with Better Hygiene

The health care industry has had a remarkably tough couple of years when it comes to security. Hacks of hospitals and health plans are now occurring almost daily, according to the U.S. Department of Health and Human Service’s online database. Over 100 million patient records were reportedly breached in 2015 — equivalent to a third...

The 5 Questions You Must Answer for Good Security Hygiene

We all know IT professionals move too frequently between fires. The demands of overly complex infrastructure, continual threats, and time-strapped IT Security teams mean leaders must go to where the smoke is, only occasionally stopping to ask themselves “Am I making any progress?” To begin to answer this question, you must start with another question…five...

Federal Agencies Should Use MEGABYTE Act to Enhance Their Cybersecurity

To protect your network, you have to know your network. This maxim is at the foundation of everything we do at Tanium. That’s why we were thrilled when, last month, the President signed into law a bill that will require federal agencies to do exactly that – get to know their network. The MEGABYTE Act...

Election Update: Cyber Edition

Election hacking is yet again in the spotlight. This week, the Washington Post reported that U.S. intelligence and law enforcement agencies are investigating a potential covert Russian operation to disrupt the November elections. This follows the news from last week that two states’ election databases were breached – only the latest in a long summer...

Compliance doesn’t have to be a risky business: Introducing Tanium Comply

Today we’re announcing the latest Tanium product module, Tanium ComplyTM. Enabled by Tanium’s unmatched speed at scale, Comply transforms the lengthy and unreliable work of validating endpoint security configuration into an activity that can be done accurately in minutes, no matter how many endpoints you have. Compliance is likely to rank high on any CIO’s...

You’re Going to Get Hacked. And Anti-Virus Won’t Save You.

The security industry is failing. Not failing to make money, of course: Gartner estimates worldwide industry spending will more than double by 2020. The failure, our failure as an industry, is that breaches continue to outpace the investment. Last year alone, budgets swelled 24%, while the number of security incidents rose 38%, according to PwC....

Is Business as Usual Possible in the Cloud?

I am privileged to have been part of two massive IT transformations in my career. At VMware, I partnered with enterprises as they embarked upon a once-in-a-generation transformation to virtual machines and then to the private cloud. I was personally involved in launching the VMware vCloud Director private cloud platform and saw some of the...

Cyber Grand Challenge: Automate the Easy Stuff

This week, Las Vegas hosted what organizers called the world’s first all-machine hacking tournament. Darpa’s Cyber Grand Challenge (CGC) tested seven machines designed to discover, prove, and fix software flaws in real-time, without human assistance. The global proliferation of endpoints – all the laptops, mobile devices, servers, clouds and other connected devices within a corporate...

Teaming up with Accenture, Palo Alto Networks, and Splunk on a new cyber defense platform

Today we’re thrilled to announce that Tanium is teaming up with Accenture, Splunk and Palo Alto Networks to power the Accenture Cyber Defense Platform (ACDP), a new breach protection platform that empowers companies to efficiently command their entire cybersecurity lifecycle with one integrated solution. The platform integrates the capabilities of Splunk, Palo Alto Networks and...

Mr. Robot: The Importance of Getting it Right

Q&A with Andre McGregor & Ryan Kazanciyan, the Tanium Duo Working Behind-the-Scenes on USA Network’s Hit Show Mr. Robot, USA Network’s critically-acclaimed cyberthriller, offers viewers a peek into the dark fictional world of a vigilante hacker tasked with saving the world. Though the premise sounds like fantasy, the technology and hacking techniques featured in the...

Time to Upgrade Federal IT: Pass the ITMF

Imagine running your business on computer systems from the 1980s or 90s. You would fail. Yet, that’s precisely where government is today — trying to tackle 21st-century problems with 20th-century technology. As US CIO Tony Scott pointed out recently, the U.S. government spends nearly 80 percent of its IT budget on maintaining legacy systems and more...

Caldicott’s health security reform fails to address basic cyber hygiene

The NHS treats more than 1 million people every 36 hours. These patients are often at their most vulnerable physically and emotionally, but so too are their digital selves. The health sector accounts for the most data security incidents in the UK  — more than 40% of all UK incidents in Q4 2015   — and regulators...

With Importance Comes Duty

  Fortune Magazine recently named Tanium one of the 25 most important private companies of 2016, recognizing the most influential private enterprises for their “prodigious revenues or assets, their social currency, their deep connection to our daily lives and their disruptive impact.” It’s an honor to be included among such an impressive list of companies...

Guest Blog: VMware & Tanium Team Up on TrustPoint

By Nicolas Rochard, Director Product Marketing, End-User Computing, VMware. Today we’re incredibly excited to introduce a new product called VMware TrustPoint through a strategic partnership between VMware and Tanium. VMware TrustPoint powered by Tanium sits at the intersection of modern endpoint security and modern endpoint management. Combining VMware’s time-tested management capabilities and Tanium’s leading-edge security...

Defining Risk Appetite: Cyber Risk and Our Hunger for Leadership

“You don’t have to be one of the recent, high profile corporate victims of a cyberattack to realise that cyber is a clear and present danger.” So began Will Brandon, the Bank of England’s Chief Information Security Officer, in his speech to the recent City Week conference. Brandon, the man charged with advising Britain’s financial...

Government must be bold if they are to help businesses manage cyber-threats

A conversation is happening in the UK about business’ responsibility to its customers in the face of rising cybersecurity threats. Last week, consumer watchdog Which? called on the Government’s new fraud taskforce to ensure companies better protect their customers from cybercrime and to compensate them for breaches. The Government’s own Cyber Governance Health Check report...

Our Design Journey

When I signed on as Chief of Design and User Experience, I was drawn to Tanium’s philosophy of customer-driven innovation, because it holistically aligns with the principles of user-centered design. I love working in industries that are early on the design curve. When I started as a UX Designer at Google Analytics, metrics were for...

Going Back to Basics to Prevent Ransomware Attacks

Ransomware attacks are now daily news as new malware families emerge with nearly the same frequency and enterprises increasingly become the targets. In fact, ransomware has become so pervasive the US and Canada this month issued a joint cyber alert warning about the recent surge in attacks. Ransomware typically enters a network as a seemingly...

Cybersecurity Vulnerability by the Numbers

Our recent report with Nasdaq & Goldsmiths, University of London, surveyed 1,530 global executives to gauge corporate leaders’ understanding of their own cybersecurity vulnerability. The results revealed some alarming findings. Download the report here to learn how to close “The Accountability Gap”.

Cyber Literacy & The Board

Tanium teamed up with NASDAQ to shed light on the gap between corporate leaders’ presumed and actual understanding of their own cybersecurity vulnerability. In “The Accountability Gap: Cybersecurity & Building a Culture of Responsibility”, researchers from Goldsmiths, University of London, identified seven inherent challenges that businesses must overcome to manage cybersecurity vulnerability: cyber literacy, risk...

Bridging the Accountability Gap: Why We Need to Adopt a Culture of Responsibility

Orion Hindawi, Co-founder & CEO, Tanium Lou Modano, Senior Vice President, CISO and Global Head of Infrastructure Services, Nasdaq Businesses face a litany of existential threats: hostile takeovers, talent departures, unpredictable customer behavior, and market fluctuations – all deeply familiar risks that leaders have carefully planned for and assessed over decades. Yet these same leaders are...

It’s Time to Get Serious About Ending Endpoint ‘Tool Bloat’

Have you managed to acquire a pile of security tools in your organization that sit unused? It’s a common issue and it’s one we see a lot in the endpoint security space. If all these products did what they said on the box or in their marketing collateral, it wouldn’t be nearly such a costly...

What’s Next in Endpoint Security: Announcing Tanium Protect™

A decade or more ago, the choice for how to allocate precious information security dollars was easy. The reality of today is much more complex. Everyone knows the limitations of traditional information security tools such as antivirus, which is still often required for regulatory or other reasons. With the potentially high cost of a breach...

A Platform for Change

Everyone has a budget they have to live within. Unfortunately, many IT Security leaders already have their hands tied — no matter the line item number — because they’ve committed the majority of their annual budgets to prevention technologies such as antivirus and intrusion protection systems, tools that no one believes actually work anymore. Procurement inertia has become as...

On Stage at the 2016 RSAConference

Q&A with Tanium’s Ryan Kazanciyan & Andre McGregor Two familiar Tanium faces will take the stage during the 2016 RSAConference next week: Director of Security Andre McGregor will speak on “The Shadowy Cyber Attack — State Sponsors of Terror and Cyber Terrorists” on Wednesday, March 3 and Chief Security Architect Ryan Kazanciyan will be presenting “IOCs are...

Only the Beginning

“There are three existential threats that can put us out of business today,” a CEO recently told me. “Meteors, nuclear war, and cybersecurity.” From boardrooms to living rooms, each of us feels the impact of data breaches. At Tanium, we know firsthand that point solutions, anti-virus tools, and strategies steeped in “hoping for the best”...

Seeing the Truth

The security industry is failing. Information Security spending is increasing year after year, yet breaches continue to outpace the investment. Last year budgets swelled another 24%, while the number of security incidents rose 38%.[1] When an entire system is spending more money only to realize the problem is getting worse, the system is broken. And...

a16z Podcast: The Fundamentals of Security and the Story of Tanium’s Growth

At September’s a16z Capital Summit, Andreessen Horowitz’s Ben Horowitz and Tanium’s Orion Hindawi sat down to discuss “The Fundamentals of Security and the Story of Tanium’s Growth”, featured this week on the a16z Podcast. Covering everything from Tanium’s five year company journey to perfect their platform to theout-of-date architecture that most companies rely on, Orion...

Reducing Risk during Mergers & Acquisitions

A checklist to create cross-company visibility of all systems Mergers and acquisitions activity among the world’s largest companies has been on the upswing since 2014 with Dow and DuPont making headlines last week as the latest blockbuster merger, following names like Starwood and Marriott and AT&T and DirecTV. Acquiring companies face a long list of...

The Time to Change Federal Cybersecurity is Now

This week, Federal CIO Tony Scott is expected to release a public report on ideas submitted from industry, government and academia to the American Council for Technology and Industry Advisory Council (ACT-IAC), a public-private partnership, for how agencies can stay ahead of and recover from cyber attacks. The report is a milestone in the race...

Cyber Security Panel Key Takeaways: What Board Members Need to Know

Tanium CFO & COO Eric Brown recently participated in a panel hosted by Nasdaq called Cyber Security: What Board Members Need to Know, alongside moderator, T.K. Kerstetter, CEO & Talk Show Host, Boardroom Resources LLC and panelists, Yafit Cohn, Associate at Simpson Thatcher & Bartlett, A.J. Kess, Partner at Simpson Thatcher & Bartlett, and Martin...

In Conversation: Nasdaq’s Brad Peterson and Tanium’s Orion Hindawi on the Six Questions Every Board Must ask their InfoSec Leadership

When facing a massive data breach, a company’s status quo — and perhaps its very existence — can all be gone in a matter of seconds. Tanium co-founder & CTO Orion Hindawi and Brad Peterson, Executive Vice President and Chief Information Officer for Nasdaq, understand better than most that countless companies are teetering on the brink of a preventable...

The Case for Board Cyber Risk Oversight

As the Audit Committee chair for a public company, I am continually evaluating the enterprise risk management (ERM) model to monitor multiple components of risk to the organization. These can be operational risks like talent departures or the acquisition of a new business unit; or financial reporting risks such as the deployment of a new...

The Global State of Information Security

As a Senior Associate, I worked closely with customers at PwC to collect information for their yearly Global State of Information Security Survey(GSISS). A decade later, I was excited to receive a copy from PwC, one of Tanium’s partners. Themes from the report included an increase in the number of incidents, continued adoption of cloud...

Improving Federal Cybersecurity is a Shared Responsibility

Today marks the start of National Cyber Security Awareness Month and the fifth anniversary of the Stop.Think.Connect campaign, the federal government’s initiative to educate Americans on how to be safer online. To demonstrate the gravity of our current cyber security landscape, simply start asking around. Not only are our national security and economy threatened, but...

Counting the Experiences and Not the Years

Today I was named one of this year’s most influential people in business under 40, a recognition I’m honored — and humbled — to receive. To be honest, it feels a bit odd to receive this kind of attention. Firstly, I am simply the product of incredibly fortunate circumstances, role models and opportunities. And any noteworthiness I have in...

Fueling Innovation through Our Customers

David and I started Tanium in 2007 because of a problem that was simple in concept and gargantuan in reality: our customers were asking us to do things we didn’t know how to do. IT was being eaten alive, and no one could create a platform to gather the data and make changes fast enough...

On the Hunt with Modern Cyber Hunters

Q&A with David Damato and Kris McConkey   Tanium Chief Security Officer David Damato and PwC UK Cyber Security Partner Kris McConkey have spent their careers on the front lines of the fight against cyber criminals within the networks of the world’s largest companies and institutions. With Tanium and PwC partnering to revolutionize how security...

Q&A with Former FBI Agents Andre McGregor & Jason Truppi

Tanium recently welcomed two former FBI Cyber Special Agents to the company, Andre McGregor and Jason Truppi. Andre and Jason bring to Tanium decades of combined experience in incident response, criminal investigation and counterintelligence, and our customers will gain from their unique perspectives from the front lines of the fight against cybercrime. We recently sat...

Tanium Ready to Help Federal Agencies Win the Cybersecurity Sprint

As a result of the recent OPM hack that may have compromised the personal information of as many as 18 million retired and current Federal employees, Tony Scott, United States Chief Information Officer, launched a mandatory 30-day Cybersecurity Sprint that requires Federal agencies to take several steps to help better protect Federal information and assets...

Introducing Tanium Trace: Changing the Game for Incident Response

For more than a decade, I’ve focused on a combination of designing secure networks, testing security controls, and investigating complex breaches. In each of these roles, I struggled to find tools that provided the visibility and control of all endpoints required to better prevent, detect and resolve security incidents. That is why I was excited — and...

Tanium Takes on Public Sector with New DC-area Office

Government agencies are under more pressure than ever to do more with less — smaller budgets, fewer resources. Yet, the increasing speed, frequency and sophistication of today’s cyber threats pose a significant challenge to the federal, state and local governments charged with protecting sensitive public data and critical infrastructure. As we’ve witnessed with the latest IRS and...

A Turning Point for U.S. Retailers

A recent study from the Ponemon Institute revealed retailers take more than six months on average — 197 days to be exact — to detect an advanced persistent threat (APT) in their network. The study’s most common method identifying an APT after notification? “A gut feeling.” Usually, retailers do not detect intrusions proactively on their own; instead, an external...

A Prescription For Change

Cybersecurity infrastructure within the nation’s leading health care companies has not kept pace with the rapid proliferation of electronic health records. As the black market price for health care-related data steadily rises, health care providers and insurance companies face the need to re-imagine their security systems to neutralize the emerging threats at their door. Over...

Information Sharing: We’re Only as Strong as Each Other

Today’s White House Summit on Cybersecurity is the climax of a momentous eight-day span that witnessed the largest ever cyber attack on a health care company and the creation of a new government agency. The formation of the Cyber Threat Intelligence Integration Center (CTIIC) certainly legitimizes the urgent need to create modern, more-agile intelligence sharing...

The State of Cyber Security

If the major security breaches of last year didn’t provide a rude awakening, then the last two weeks should have at least made it clear that our government has prioritized cyber security and is taking steps to protect its citizens. Two weeks ago, Pres. Obama announced a slew of initiatives under new cyber security legislation...

The New Model for Security: Speed Matters

“The problem with the attacks we are seeing these days is that they are starting and ending so quickly that knowing what you looked like even an hour ago is not helpful.” — Orion Hindawi In this interview, Orion Hindawi, Tanium Co-Founder and CTO, discusses where current security approaches are falling short and why anything longer than...

Tanium Adds Soltra to its Threat Intelligence Ecosystem to Turn Tables on Cyber Attackers

As the world looks to make the Internet its platform for finance, the stakes in the cybersecurity landscape have never been higher. We read daily about cyber attacks against the financial industry, demonstrating a sad reality and an uncomfortable truth: Despite having access to the best IT security talent available, the world’s leading financial services...
Show more