The Tanium 10 | Cost Of A Data Breach Declines (Slightly)

Welcome to The Tanium 10, our weekly roundup of the news that matters most to security and IT professionals. Each week, we spotlight the 10 stories, trend reports, and research that caught our eye—all to help you keep up with what’s happening in our fast-paced industry. We value your feedback. Once you’ve read this week’s...

The Tanium 10 | Mac OS In Malware Crosshairs

Welcome to The Tanium 10, our weekly roundup of the news that matters most to security and IT professionals. Each week, we spotlight the 10 stories, trend reports, and research that caught our eye—all to help you keep up with what’s happening in our fast-paced industry. We value your feedback. Once you’ve read this week’s...

The Tanium 10 | 22 Arrested Under China’s New Cybersecurity Law

Welcome to The Tanium 10, our weekly roundup of the news that matters most to security and IT professionals. Each week, we spotlight the 10 stories, trend reports, and research that caught our eye—all to help you keep up with what’s happening in our fast-paced industry. We value your feedback. Once you’ve read this week’s...

Introducing The Tanium 10: Keeping Up With Our Fast-Paced Industry

Welcome to The Tanium 10, our weekly roundup of the news that matters most to security and IT professionals. Each week, we spotlight the 10 stories, trend reports, and research that caught our eye—all to help you keep up with what’s happening in our fast-paced industry. We value your feedback. Once you’ve read this week’s...

Welcoming Steven A. Adams, Tanium’s New Chief Accounting Officer

Steven A. Adams joins Tanium at a key point in the company’s evolution, and is charged with positioning the accounting organization to realize the full potential of our rapid growth. Who doesn’t want a dynamic in which complementary skills elevate an organization well above the sum of its parts? This dynamic was top-of-mind for me...

Windows 10 Migration: Don’t Let Complexity Hold You Back

In the first of our three-part series on Windows 10 migration, Dushyanth Nataraj, Director of Product Marketing at Tanium, explores why moving to the latest Microsoft operating system is so different from any that have come before. He breaks down the people, process, and technology requirements, and offers guidance on how you can accelerate key...

Tanium Receives A Resounding Vote Of Confidence From The Investor Community

A stock round led by TPG Growth and other existing investors raises an additional $100 million for the company. This latest round is a testament to the strength of Tanium’s offering as an essential platform helping enterprises solve critical cybersecurity and IT operations challenges. I’m delighted to announce that Tanium has raised an additional $100...

Helping State Governments Respond To Cybersecurity Incidents

When it comes to cybersecurity incidents, states bear a lot of the burden. They are responsible for protecting countless resources that provide essential services to citizens – from transportation and roadways, to school systems and Medicaid systems, to the energy grid and voting infrastructure. Here, Tanium’s EDR Director Jason Truppi shares his guidelines for how state governments...

WannaCry Attack: How Fear Of Change Got Us Here

As Tanium’s Chief Security Architect, Ryan Kazanciyan has witnessed the internal response processes at dozens of businesses around the world in the wake of the WannaCry ransomware attack. His biggest takeaway? Institutionalized resistance to change – not simple neglect – is one of the biggest reasons so many companies were left vulnerable. Here’s what you...

Chris Bream Joins Today as Tanium’s CTO

Building a world-class leadership team is one of my top priorities. To that end, I’m delighted to share that Chris Bream is joining us today as Tanium’s new Chief Technology Officer. I’ve held the CTO role since we founded Tanium 10 years ago, and I held on to those responsibilities after I became CEO last...

This Time, It’s Personal: WannaCry And The Psychology Of The Cyber Accountability Gap

While the speed with which WannaCry ransomware spread is not new, it does raise new issues of accountability — specifically personal accountability for how we should be protecting ourselves from cyber attacks and, more importantly, holding both governments and vendors accountable for developing safe technologies. To curtail the next WannaCry epidemic, we need the same...

The Three Stages of Security Hygiene: Measurement

Security hygiene means something different to everyone. Because of this, addressing security hygiene can be a daunting task. In the last of our three-part blog series, Tanium CSO David Damato provides guidelines on what’s worth measuring, and why. After implementing a leading information security program most organizations declare “mission accomplished.” As a result, security processes...

NIST Cybersecurity Framework Updates Emphasize Supply Chain, Metrics

The revised NIST Cybersecurity Framework  includes two key changes: expanded details on cyber supply chain risk management, and a new section on cybersecurity metrics and measurement. Tanium CSO David Damato explains why these updates matter for businesses, and where we see room for further improvement. The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework,...

An Open Letter From Tanium’s CEO To Our Customers

I can imagine that many of you are getting tired of waking up to the bad Tanium press stories hitting your inbox in the last week. Most of you know our company well, and reading these stories can be disturbing to all of us. Unfortunately, it’s not always effective to use the press directly to...

Legacy Software: Where The UK’s Transformation Strategy Falls Short

The UK government’s ambitious Transformation Strategy aims to fundamentally change the way the public sector operates online. If this is to happen, and to happen safely, the government must make ditching outdated legacy software a hard priority. The UK’s Government Transformation Strategy was finally released earlier this year after significant delays to allow Whitehall departments to “embed”...

Welcoming Fazal Merchant, Our New COO & CFO

I’m thrilled to welcome our new Chief Operating Officer and Chief Financial Officer, Fazal Merchant, to Tanium’s leadership team. From our first conversation, it was clear to us that Fazal was the right fit for Tanium. To build a truly great company, we need proven business leaders who are passionate about our mission and whose...

Why IT Is Failing At Security Hygiene: Survey

IT leaders have a problem with perception versus reality when it comes to understanding what’s happening with their endpoints, according to a recent Frost and Sullivan survey commissioned by Tanium. Here’s what we found out about security hygiene practices, and what you can do about it. While nearly everyone agrees security hygiene is essential to...

The Three Stages Of Security Hygiene: Framework

In the second installment of our three-part series, Tanium CSO David Damato explores how to use risk-based frameworks to build a mature and sustainable cybersecurity program. When building a cybersecurity program, many organizations focus only on  prevention. In theory this sounds great. But, in my experience, focusing only on prevention actually increases your chances for...

Looking Inward For The Best Threat Data

Organizations cannot afford to remain wholly dependent on a lifeline of one-size-fits-all data feeds in order to detect attacks. Tanium’s Chief Security Architect Ryan Kazanciyan offers guidance on how to find the best threat data to address your organization’s unique needs. Ask any CISO to identify his or her top priorities and you will consistently hear...

The Three Stages Of Security Hygiene: Evaluation

In the first installment of our three-part series, Tanium CSO David Damato explores why good security hygiene is so essential, and details the first stage to getting your IT organization in order.   Are you guilty of poor security hygiene? If so, take heart. You’re not alone. IT and security teams have long neglected basic...

Skills Gap, Disorganization Are Key Obstacles To UK’s Cybersecurity Progress

Even as the UK government establishes itself as a leader in the global fight against cyber threats, last month’s report from the Public Accounts Committee reminds us how much work remains to be done. The official opening of the UK’s National Cyber Security Centre by the Queen was a watershed moment for the nation as...

Where Compliance and Security Hygiene Meet: Exploring The PCI TLS Encryption Update

If you’re looking at compliance as the endgame of your overall security hygiene practices, you’ll be missing out on crucial updates. The looming PCI TLS encryption upgrade offers us a prime case in point. Compliance and security hygiene go hand-in-hand. Conventional wisdom posits that the more compliant you are the better your security hygiene program will...

Welcoming Maggie Wilderotter and Anthony Belfiore to Our Board

We’re entering our tenth year as a company. A decade ago, the very idea of Tanium was impossible for most enterprise IT teams to imagine: a platform that could provide accurate and up-to-date information about the state of every endpoint on a network in seconds, across the largest networks, up to many millions of endpoints....

Government IT Leaders Recognize Need for Speed

Officials from the U.S. Cyber Command, the Air Force, and the Department of Homeland Security are finding ways to strengthen our nation’s IT defenses in short amounts of time. Here’s how they’re doing it. A little known but important shift is happening across the government IT world right now. Federal CIOs and CISOs are recognizing...

What’s Next in Compliance and Security: Introducing Tanium Integrity Monitor

Regulatory compliance is an acute pain point our customers raise with us time and again. The pace and complexity of compliance standards are increasing, and compliance tools are not keeping up. While there is no silver bullet for compliance, we see tremendous opportunity to simplify and drive efficiencies. Today, we are announcing Tanium Integrity Monitor...

CSIS Lays Out Its Cybersecurity Agenda

The Center for Strategic and International Studies (CSIS), one of the world’s leading public policy research institutions, released its cybersecurity recommendations earlier this month for the new US Administration. The highly anticipated report from the CSIS’s Cyber Task Force comes at a major turning point in history. Within 24 hours of its release, the Office...

Driving the Automotive Industry toward Better Security

In just the past few years, the technology in our cars and trucks has improved considerably. Features like forward-collision warning and automatic emergency braking, enabled by advances in sensors and real-time data analytics, have made our vehicles, and us, safer. Autonomous vehicles, already in use in some cities, have the potential to further improve driver...

The 3 Security Challenges to Digitizing the NHS

Last year the UK Government set an ambitious target of making the National Health Service (NHS) paperless by 2020, a move that will see hundreds of thousands of patient records digitized. In 2017, hospitals will be obliged to allow patients to view their medical records online, following in the footsteps of the UK’s general practitioners....

Five Cybersecurity Predictions for 2017

To call 2016 ‘eventful’ in the IT Security space would be an understatement. From Mirai to ransomware and NSA shadow brokers to Yahoo!, this year introduced new threats birthed from age-old challenges. Given the unique turbulence of 2016, and the industry’s overall failure to manage and protect networks any better than the years prior, the...

Collaboration is Key to Enhancing Energy Sector’s Cybersecurity

November is National Critical Infrastructure Security and Resilience Month, and there is no better time to highlight the importance of keeping one of our nation’s most critical infrastructures secure: the energy sector. Though we often take it for granted, our way of life depends on the security and stability of our nation’s energy industry. Recent...

Tanium Named to Deloitte Technology Fast 500™

Today we’re thrilled to share Deloitte has named Tanium a Technology Fast 500™ award winner and the 15th fastest-growing technology company in the nation and among the top 10 software companies. The Technology Fast 500 is an award program sponsored by Deloitte to recognize the 500 fastest growing technology, media, telecommunications, life sciences, and energy...

CONVERGE 2016: Highlights From Our Inaugural Conference

Don’t miss out. Join us for CONVERGE17, October 16-19, 2017, in San Francisco. Register here. And that’s a wrap on Tanium CONVERGE16, our inaugural–and sold out!–user conference. We couldn’t be more more grateful to the 450+ customers, partners, and experts from over 170 businesses and government agencies who spent their week in San Francisco with us....

Introducing Tanium Trends

Our customers frequently tell me how effective Tanium is at managing and securing their network. As Chief of Design and User Experience it’s my job to ensure that all Tanium users, of all skill levels, are able to harness and understand this power and to provide ways to track and communicate the state of their...

Why We CONVERGE

Today we kick off CONVERGE, our inaugural conference in San Francisco. We’re gathering together our customers, team, partners, and technical experts to learn from each other and share how they are readying themselves for the challenges of today and tomorrow. And of course, we wouldn’t invite this many people without some exciting news to share....

Bank of America Merrill Lynch Honors Tanium for Innovation in Enterprise Technology

We are honored to share that Bank of America Merrill Lynch (BofAML) has recognized Tanium for its innovation in enterprise technology, and was chosen as this year’s sole recipient of this distinction at their 8th annual Technology Innovation Summit held in Silicon Valley this week. BofAML selected Tanium as a standout among all enterprise tech...

Broken Cyber Hygiene: A Case Study

With more than 200 different products from 125 vendors to solve the top 20 security controls (deep breath), there’s no shortage of information security tools in the market. Organizations are building defensive arsenals with these tools, but the intruders are still slipping through the digital “doors and windows” left open and unlocked by the organization....

The UK Needs Actions, Not Words, to Encourage Basic Cyber Hygiene

The UK’s newly appointed Minister for the Digital Industries Matt Hancock gave his first speech on cybersecurity last month. Hancock is tasked with managing government policy towards the fast growing digital and creative sectors, ensuring they continue to thrive. Speaking to an audience of businesses he acknowledged that the “vast majority of cyber attacks exploit...

What does Cybersecurity Awareness Mean to You?

At Tanium, awareness is the foundation of what we do: being aware of your entire network, and what’s happening on it, is the first step in building an IT security strategy fit for today’s threat environment. You could say awareness is the first component of cyber hygiene: after you know what’s on your network, you...

The Increasing Popularity of the NIST Cybersecurity Framework

In 2014, the U.S. Commerce Department’s National Institute of Standards and Technology (NIST) created one of the most crucial pieces of cybersecurity guidance called the NIST Cybersecurity Framework, a common denominator for businesses across all industries to better assess risk and enhance the security and resilience of critical infrastructure. The Framework provides both private and...

Security in the auto-tech industry is not up to speed

The British Government’s investigation into driverless cars has just come to a close. One of the key aims was to provide guidance to motorists about autonomous vehicle safety, but their work missed out one key area: cyber security. The current approach to this serious issue is outdated and not fit for cars of the future....

US Chamber of Commerce Panel Recap: Three Keys to Better Cybersecurity

Credit: Vincent Voci The cybersecurity world faces a unique conundrum. On one hand, cybersecurity is becoming ever more present in our daily lives. Rarely does a week go by when we don’t hear that a major business or government agency has been breached. Today, it’s no longer a matter of if, but when, a breach...

Volume of Breaches Risks Breeding Inaction

Reports appear everyday about the cybersecurity threat facing British businesses. In the last six months alone, the major UK press have written almost 1,000 articles on cybersecurity threats. And it’s no surprise, given two thirds of large UK businesses were hit by a cyber breach or attack in the past year. But with this constant...

Be Ready: The Converge Countdown Begins

Be Ready. What does that simple command mean to you? Concern? Confidence? Or maybe it reminds you of the running to-do list you have, but never seem to finish? At Tanium, “Be Ready” means being prepared for a future that requires a new strategy and the technology to execute at speed and scale. It’s what...

Five Ways the Health Care Industry can Improve its Cyberhealth with Better Hygiene

The health care industry has had a remarkably tough couple of years when it comes to security. Hacks of hospitals and health plans are now occurring almost daily, according to the U.S. Department of Health and Human Service’s online database. Over 100 million patient records were reportedly breached in 2015 — equivalent to a third...

The 5 Questions You Must Answer for Good Security Hygiene

We all know IT professionals move too frequently between fires. The demands of overly complex infrastructure, continual threats, and time-strapped IT Security teams mean leaders must go to where the smoke is, only occasionally stopping to ask themselves “Am I making any progress?” To begin to answer this question, you must start with another question…five...

Federal Agencies Should Use MEGABYTE Act to Enhance Their Cybersecurity

To protect your network, you have to know your network. This maxim is at the foundation of everything we do at Tanium. That’s why we were thrilled when, last month, the President signed into law a bill that will require federal agencies to do exactly that – get to know their network. The MEGABYTE Act...

Election Update: Cyber Edition

Election hacking is yet again in the spotlight. This week, the Washington Post reported that U.S. intelligence and law enforcement agencies are investigating a potential covert Russian operation to disrupt the November elections. This follows the news from last week that two states’ election databases were breached – only the latest in a long summer...

Compliance doesn’t have to be a risky business: Introducing Tanium Comply

Today we’re announcing the latest Tanium product module, Tanium ComplyTM. Enabled by Tanium’s unmatched speed at scale, Comply transforms the lengthy and unreliable work of validating endpoint security configuration into an activity that can be done accurately in minutes, no matter how many endpoints you have. Compliance is likely to rank high on any CIO’s...

You’re Going to Get Hacked. And Anti-Virus Won’t Save You.

The security industry is failing. Not failing to make money, of course: Gartner estimates worldwide industry spending will more than double by 2020. The failure, our failure as an industry, is that breaches continue to outpace the investment. Last year alone, budgets swelled 24%, while the number of security incidents rose 38%, according to PwC....

Is Business as Usual Possible in the Cloud?

I am privileged to have been part of two massive IT transformations in my career. At VMware, I partnered with enterprises as they embarked upon a once-in-a-generation transformation to virtual machines and then to the private cloud. I was personally involved in launching the VMware vCloud Director private cloud platform and saw some of the...

Cyber Grand Challenge: Automate the Easy Stuff

This week, Las Vegas hosted what organizers called the world’s first all-machine hacking tournament. Darpa’s Cyber Grand Challenge (CGC) tested seven machines designed to discover, prove, and fix software flaws in real-time, without human assistance. The global proliferation of endpoints – all the laptops, mobile devices, servers, clouds and other connected devices within a corporate...

Teaming up with Accenture, Palo Alto Networks, and Splunk on a new cyber defense platform

Today we’re thrilled to announce that Tanium is teaming up with Accenture, Splunk and Palo Alto Networks to power the Accenture Cyber Defense Platform (ACDP), a new breach protection platform that empowers companies to efficiently command their entire cybersecurity lifecycle with one integrated solution. The platform integrates the capabilities of Splunk, Palo Alto Networks and...

Mr. Robot: The Importance of Getting it Right

Q&A with Andre McGregor & Ryan Kazanciyan, the Tanium Duo Working Behind-the-Scenes on USA Network’s Hit Show Mr. Robot, USA Network’s critically-acclaimed cyberthriller, offers viewers a peek into the dark fictional world of a vigilante hacker tasked with saving the world. Though the premise sounds like fantasy, the technology and hacking techniques featured in the...

Time to Upgrade Federal IT: Pass the ITMF

Imagine running your business on computer systems from the 1980s or 90s. You would fail. Yet, that’s precisely where government is today — trying to tackle 21st-century problems with 20th-century technology. As US CIO Tony Scott pointed out recently, the U.S. government spends nearly 80 percent of its IT budget on maintaining legacy systems and more...

Caldicott’s health security reform fails to address basic cyber hygiene

The NHS treats more than 1 million people every 36 hours. These patients are often at their most vulnerable physically and emotionally, but so too are their digital selves. The health sector accounts for the most data security incidents in the UK  — more than 40% of all UK incidents in Q4 2015   — and regulators...

With Importance Comes Duty

Fortune Magazine recently named Tanium one of the 25 most important private companies of 2016, recognizing the most influential private enterprises for their “prodigious revenues or assets, their social currency, their deep connection to our daily lives and their disruptive impact.” It’s an honor to be included among such an impressive list of companies challenging...

Defining Risk Appetite: Cyber Risk and Our Hunger for Leadership

“You don’t have to be one of the recent, high profile corporate victims of a cyberattack to realise that cyber is a clear and present danger.” So began Will Brandon, the Bank of England’s Chief Information Security Officer, in his speech to the recent City Week conference. Brandon, the man charged with advising Britain’s financial...

Government must be bold if they are to help businesses manage cyber-threats

A conversation is happening in the UK about business’ responsibility to its customers in the face of rising cybersecurity threats. Last week, consumer watchdog Which? called on the Government’s new fraud taskforce to ensure companies better protect their customers from cybercrime and to compensate them for breaches. The Government’s own Cyber Governance Health Check report...

Our Design Journey

When I signed on as Chief of Design and User Experience, I was drawn to Tanium’s philosophy of customer-driven innovation, because it holistically aligns with the principles of user-centered design. I love working in industries that are early on the design curve. When I started as a UX Designer at Google Analytics, metrics were for...

Going Back to Basics to Prevent Ransomware Attacks

Ransomware attacks are now daily news as new malware families emerge with nearly the same frequency and enterprises increasingly become the targets. In fact, ransomware has become so pervasive the US and Canada this month issued a joint cyber alert warning about the recent surge in attacks. Ransomware typically enters a network as a seemingly...

Cybersecurity Vulnerability by the Numbers

Our recent report with Nasdaq & Goldsmiths, University of London, surveyed 1,530 global executives to gauge corporate leaders’ understanding of their own cybersecurity vulnerability. The results revealed some alarming findings. Download the report here to learn how to close “The Accountability Gap.”

Cyber Literacy & The Board

Tanium teamed up with NASDAQ to shed light on the gap between corporate leaders’ presumed and actual understanding of their own cybersecurity vulnerability. In “The Accountability Gap: Cybersecurity & Building a Culture of Responsibility”, researchers from Goldsmiths, University of London, identified seven inherent challenges that businesses must overcome to manage cybersecurity vulnerability: cyber literacy, risk...

Bridging the Accountability Gap: Why We Need to Adopt a Culture of Responsibility

Orion Hindawi, Co-founder & CEO, Tanium Lou Modano, Senior Vice President, CISO and Global Head of Infrastructure Services, Nasdaq Businesses face a litany of existential threats: hostile takeovers, talent departures, unpredictable customer behavior, and market fluctuations – all deeply familiar risks that leaders have carefully planned for and assessed over decades. Yet these same leaders are...

It’s Time to Get Serious About Ending Endpoint ‘Tool Bloat’

Have you managed to acquire a pile of security tools in your organization that sit unused? It’s a common issue and it’s one we see a lot in the endpoint security space. If all these products did what they said on the box or in their marketing collateral, it wouldn’t be nearly such a costly...

What’s Next in Endpoint Security: Announcing Tanium Protect™

A decade or more ago, the choice for how to allocate precious information security dollars was easy. The reality of today is much more complex. Everyone knows the limitations of traditional information security tools such as antivirus, which is still often required for regulatory or other reasons. With the potentially high cost of a breach...

A Platform for Change

Everyone has a budget they have to live within. Unfortunately, many IT Security leaders already have their hands tied — no matter the line item number — because they’ve committed the majority of their annual budgets to prevention technologies such as antivirus and intrusion protection systems, tools that no one believes actually work anymore. Procurement inertia has become as...

On Stage at the 2016 RSA Conference

Q&A with Tanium’s Ryan Kazanciyan & Andre McGregor Two familiar Tanium faces will take the stage during the 2016 RSAConference next week: Director of Security Andre McGregor will speak on “The Shadowy Cyber Attack — State Sponsors of Terror and Cyber Terrorists” on Wednesday, March 3 and Chief Security Architect Ryan Kazanciyan will be presenting “IOCs are...

Only the Beginning

“There are three existential threats that can put us out of business today,” a CEO recently told me. “Meteors, nuclear war, and cybersecurity.” From boardrooms to living rooms, each of us feels the impact of data breaches. At Tanium, we know firsthand that point solutions, anti-virus tools, and strategies steeped in “hoping for the best”...

Seeing the Truth

The security industry is failing. Information Security spending is increasing year after year, yet breaches continue to outpace the investment. Last year budgets swelled another 24%, while the number of security incidents rose 38%.[1] When an entire system is spending more money only to realize the problem is getting worse, the system is broken. And...

a16z Podcast: The Fundamentals of Security and the Story of Tanium’s Growth

At September’s a16z Capital Summit, Andreessen Horowitz’s Ben Horowitz and Tanium’s Orion Hindawi sat down to discuss “The Fundamentals of Security and the Story of Tanium’s Growth”, featured this week on the a16z Podcast. Covering everything from Tanium’s five year company journey to perfect their platform to theout-of-date architecture that most companies rely on, Orion...

Reducing Risk during Mergers & Acquisitions

A checklist to create cross-company visibility of all systems Mergers and acquisitions activity among the world’s largest companies has been on the upswing since 2014 with Dow and DuPont making headlines last week as the latest blockbuster merger, following names like Starwood and Marriott and AT&T and DirecTV. Acquiring companies face a long list of...

The Time to Change Federal Cybersecurity is Now

This week, Federal CIO Tony Scott is expected to release a public report on ideas submitted from industry, government and academia to the American Council for Technology and Industry Advisory Council (ACT-IAC), a public-private partnership, for how agencies can stay ahead of and recover from cyber attacks. The report is a milestone in the race...

Cyber Security Panel Key Takeaways: What Board Members Need to Know

Tanium CFO & COO Eric Brown recently participated in a panel hosted by Nasdaq called Cyber Security: What Board Members Need to Know, alongside moderator, T.K. Kerstetter, CEO & Talk Show Host, Boardroom Resources LLC and panelists, Yafit Cohn, Associate at Simpson Thatcher & Bartlett, A.J. Kess, Partner at Simpson Thatcher & Bartlett, and Martin...

In Conversation: Nasdaq’s Brad Peterson and Tanium’s Orion Hindawi on the Six Questions Every Board Must ask their InfoSec Leadership

When facing a massive data breach, a company’s status quo — and perhaps its very existence — can all be gone in a matter of seconds. Tanium co-founder & CTO Orion Hindawi and Brad Peterson, Executive Vice President and Chief Information Officer for Nasdaq, understand better than most that countless companies are teetering on the brink of a preventable...

The Case for Board Cyber Risk Oversight

As the Audit Committee chair for a public company, I am continually evaluating the enterprise risk management (ERM) model to monitor multiple components of risk to the organization. These can be operational risks like talent departures or the acquisition of a new business unit; or financial reporting risks such as the deployment of a new...

The Global State of Information Security

As a Senior Associate, I worked closely with customers at PwC to collect information for their yearly Global State of Information Security Survey(GSISS). A decade later, I was excited to receive a copy from PwC, one of Tanium’s partners. Themes from the report included an increase in the number of incidents, continued adoption of cloud...

Improving Federal Cybersecurity is a Shared Responsibility

Today marks the start of National Cyber Security Awareness Month and the fifth anniversary of the Stop.Think.Connect campaign, the federal government’s initiative to educate Americans on how to be safer online. To demonstrate the gravity of our current cyber security landscape, simply start asking around. Not only are our national security and economy threatened, but...

Counting the Experiences and Not the Years

Today I was named one of this year’s most influential people in business under 40, a recognition I’m honored — and humbled — to receive. To be honest, it feels a bit odd to receive this kind of attention. Firstly, I am simply the product of incredibly fortunate circumstances, role models and opportunities. And any noteworthiness I have in...

Fueling Innovation Through Our Customers

David and I started Tanium in 2007 because of a problem that was simple in concept and gargantuan in reality: our customers were asking us to do things we didn’t know how to do. IT was being eaten alive, and no one could create a platform to gather the data and make changes fast enough...

On the Hunt with Modern Cyber Hunters

Q&A with David Damato and Kris McConkey Tanium Chief Security Officer David Damato and PwC UK Cyber Security Partner Kris McConkey have spent their careers on the front lines of the fight against cyber criminals within the networks of the world’s largest companies and institutions. With Tanium and PwC partnering to revolutionize how security and...

Q&A with Former FBI Agents Andre McGregor & Jason Truppi

Tanium recently welcomed two former FBI Cyber Special Agents to the company, Andre McGregor and Jason Truppi. Andre and Jason bring to Tanium decades of combined experience in incident response, criminal investigation and counterintelligence, and our customers will gain from their unique perspectives from the front lines of the fight against cybercrime. We recently sat...

Tanium Ready to Help Federal Agencies Win the Cybersecurity Sprint

As a result of the recent OPM hack that may have compromised the personal information of as many as 18 million retired and current Federal employees, Tony Scott, United States Chief Information Officer, launched a mandatory 30-day Cybersecurity Sprint that requires Federal agencies to take several steps to help better protect Federal information and assets...

Introducing Tanium Trace: Changing the Game for Incident Response

For more than a decade, I’ve focused on a combination of designing secure networks, testing security controls, and investigating complex breaches. In each of these roles, I struggled to find tools that provided the visibility and control of all endpoints required to better prevent, detect and resolve security incidents. That is why I was excited — and...

Tanium Takes on Public Sector with New DC-area Office

Government agencies are under more pressure than ever to do more with less — smaller budgets, fewer resources. Yet, the increasing speed, frequency and sophistication of today’s cyber threats pose a significant challenge to the federal, state and local governments charged with protecting sensitive public data and critical infrastructure. As we’ve witnessed with the latest IRS and...

A Turning Point for U.S. Retailers

A recent study from the Ponemon Institute revealed retailers take more than six months on average — 197 days to be exact — to detect an advanced persistent threat (APT) in their network. The study’s most common method identifying an APT after notification? “A gut feeling.” Usually, retailers do not detect intrusions proactively on their own; instead, an external...

A Prescription For Change

Cybersecurity infrastructure within the nation’s leading health care companies has not kept pace with the rapid proliferation of electronic health records. As the black market price for health care-related data steadily rises, health care providers and insurance companies face the need to re-imagine their security systems to neutralize the emerging threats at their door. Over...

Information Sharing: We’re Only as Strong as Each Other

Today’s White House Summit on Cybersecurity is the climax of a momentous eight-day span that witnessed the largest ever cyber attack on a health care company and the creation of a new government agency. The formation of the Cyber Threat Intelligence Integration Center (CTIIC) certainly legitimizes the urgent need to create modern, more-agile intelligence sharing...

The State of Cyber Security

If the major security breaches of last year didn’t provide a rude awakening, then the last two weeks should have at least made it clear that our government has prioritized cyber security and is taking steps to protect its citizens. Two weeks ago, Pres. Obama announced a slew of initiatives under new cyber security legislation...

The New Model for Security: Speed Matters

“The problem with the attacks we are seeing these days is that they are starting and ending so quickly that knowing what you looked like even an hour ago is not helpful.” — Orion Hindawi In this interview, Orion Hindawi, Tanium Co-Founder and CTO, discusses where current security approaches are falling short and why anything longer than...

Tanium Adds Soltra to its Threat Intelligence Ecosystem to Turn Tables on Cyber Attackers

As the world looks to make the Internet its platform for finance, the stakes in the cybersecurity landscape have never been higher. We read daily about cyber attacks against the financial industry, demonstrating a sad reality and an uncomfortable truth: Despite having access to the best IT security talent available, the world’s leading financial services...
Show more