The Tanium 10: Must See TV: Mr. Robot | Is Hacking A New Olympic Event?

Welcome to The Tanium 10, our weekly roundup of the news that matters most to security and IT professionals. Each week, we spotlight the 10 stories, trend reports, and research that caught our eye—all to help you keep up with what’s happening in our fast-paced industry. We value your feedback. Once you’ve read this week’s...

Introducing The Tanium 10: Keeping Up With Our Fast-Paced Industry

Welcome to The Tanium 10, our weekly roundup of the news that matters most to security and IT professionals. Each week, we spotlight the 10 stories, trend reports, and research that caught our eye—all to help you keep up with what’s happening in our fast-paced industry. We value your feedback. Once you’ve read this week’s...

Why IT Is Failing At Security Hygiene: Survey

IT leaders have a problem with perception versus reality when it comes to understanding what’s happening with their endpoints, according to a recent Frost and Sullivan survey commissioned by Tanium. Here’s what we found out about security hygiene practices, and what you can do about it. While nearly everyone agrees security hygiene is essential to...

Looking Inward For The Best Threat Data

Organizations cannot afford to remain wholly dependent on a lifeline of one-size-fits-all data feeds in order to detect attacks. Tanium’s Chief Security Architect Ryan Kazanciyan offers guidance on how to find the best threat data to address your organization’s unique needs. Ask any CISO to identify his or her top priorities and you will consistently hear...

Where Compliance and Security Hygiene Meet: Exploring The PCI TLS Encryption Update

If you’re looking at compliance as the endgame of your overall security hygiene practices, you’ll be missing out on crucial updates. The looming PCI TLS encryption upgrade offers us a prime case in point. Compliance and security hygiene go hand-in-hand. Conventional wisdom posits that the more compliant you are the better your security hygiene program will...

Welcoming Maggie Wilderotter and Anthony Belfiore to Our Board

We’re entering our tenth year as a company. A decade ago, the very idea of Tanium was impossible for most enterprise IT teams to imagine: a platform that could provide accurate and up-to-date information about the state of every endpoint on a network in seconds, across the largest networks, up to many millions of endpoints....

An Integrated Workflow: Investigating and Remediating a Mass-Malware Infection

I recently had the opportunity to help a customer use Tanium to investigate and respond to an outbreak of the “Ponik” malware. Ponik is a downloader that can retrieve and install additional malware, as well as steal credentials, from an infected system. Though Ponik is an example of commodity mass-malware, it presented a good opportunity...

With Importance Comes Duty

Fortune Magazine recently named Tanium one of the 25 most important private companies of 2016, recognizing the most influential private enterprises for their “prodigious revenues or assets, their social currency, their deep connection to our daily lives and their disruptive impact.” It’s an honor to be included among such an impressive list of companies challenging...

Hunting for Rogue PowerShell Profiles

During the earliest phases of an intrusion, attackers typically move to establish persistence on at least a subset of compromised systems. This might be to ensure that they can easily regain access to the victim environment, such as via a backdoor, or to keep other forms of malicious code running, such as a keystroke logger....