Looking Inward For The Best Threat Data

Organizations cannot afford to remain wholly dependent on a lifeline of one-size-fits-all data feeds in order to detect attacks. Tanium’s Chief Security Architect Ryan Kazanciyan offers guidance on how to find the best threat data to address your organization’s unique needs. Ask any CISO to identify his or her top priorities and you will consistently hear...

An Integrated Workflow: Investigating and Remediating a Mass-Malware Infection

I recently had the opportunity to help a customer use Tanium to investigate and respond to an outbreak of the “Ponik” malware. Ponik is a downloader that can retrieve and install additional malware, as well as steal credentials, from an infected system. Though Ponik is an example of commodity mass-malware, it presented a good opportunity...

Government must be bold if they are to help businesses manage cyber-threats

A conversation is happening in the UK about business’ responsibility to its customers in the face of rising cybersecurity threats. Last week, consumer watchdog Which? called on the Government’s new fraud taskforce to ensure companies better protect their customers from cybercrime and to compensate them for breaches. The Government’s own Cyber Governance Health Check report...

Information Sharing: We’re Only as Strong as Each Other

Today’s White House Summit on Cybersecurity is the climax of a momentous eight-day span that witnessed the largest ever cyber attack on a health care company and the creation of a new government agency. The formation of the Cyber Threat Intelligence Integration Center (CTIIC) certainly legitimizes the urgent need to create modern, more-agile intelligence sharing...