Why IT Is Failing At Security Hygiene: Survey

IT leaders have a problem with perception versus reality when it comes to understanding what’s happening with their endpoints, according to a recent Frost and Sullivan survey commissioned by Tanium. Here’s what we found out about security hygiene practices, and what you can do about it. While nearly everyone agrees security hygiene is essential to...

Looking Inward For The Best Threat Data

Organizations cannot afford to remain wholly dependent on a lifeline of one-size-fits-all data feeds in order to detect attacks. Tanium’s Chief Security Architect Ryan Kazanciyan offers guidance on how to find the best threat data to address your organization’s unique needs. Ask any CISO to identify his or her top priorities and you will consistently hear...

Where Compliance and Security Hygiene Meet: Exploring The PCI TLS Encryption Update

If you’re looking at compliance as the endgame of your overall security hygiene practices, you’ll be missing out on crucial updates. The looming PCI TLS encryption upgrade offers us a prime case in point. Compliance and security hygiene go hand-in-hand. Conventional wisdom posits that the more compliant you are the better your security hygiene program will...

Welcoming Maggie Wilderotter and Anthony Belfiore to Our Board

We’re entering our tenth year as a company. A decade ago, the very idea of Tanium was impossible for most enterprise IT teams to imagine: a platform that could provide accurate and up-to-date information about the state of every endpoint on a network in seconds, across the largest networks, up to many millions of endpoints....

An Integrated Workflow: Investigating and Remediating a Mass-Malware Infection

I recently had the opportunity to help a customer use Tanium to investigate and respond to an outbreak of the “Ponik” malware. Ponik is a downloader that can retrieve and install additional malware, as well as steal credentials, from an infected system. Though Ponik is an example of commodity mass-malware, it presented a good opportunity...

With Importance Comes Duty

  Fortune Magazine recently named Tanium one of the 25 most important private companies of 2016, recognizing the most influential private enterprises for their “prodigious revenues or assets, their social currency, their deep connection to our daily lives and their disruptive impact.” It’s an honor to be included among such an impressive list of companies...

Hunting for Rogue PowerShell Profiles

During the earliest phases of an intrusion, attackers typically move to establish persistence on at least a subset of compromised systems. This might be to ensure that they can easily regain access to the victim environment, such as via a backdoor, or to keep other forms of malicious code running, such as a keystroke logger....

Government must be bold if they are to help businesses manage cyber-threats

A conversation is happening in the UK about business’ responsibility to its customers in the face of rising cybersecurity threats. Last week, consumer watchdog Which? called on the Government’s new fraud taskforce to ensure companies better protect their customers from cybercrime and to compensate them for breaches. The Government’s own Cyber Governance Health Check report...

What’s Old is New: Detecting Office Macro Malware with Tanium

Years of InfoSec experience will tell you that security threats are cyclical. What is old will become new and what is new will eventually become old. We’ve seen proof of this from the re-emergence of devastating distributed denial of service attacks, massive malvertising campaigns, and more recently, macro-based malware attacks. For example, several of the...