Broken Cyber Hygiene: A Case Study

With more than 200 different products from 125 vendors to solve the top 20 security controls (deep breath), there’s no shortage of information security tools in the market. Organizations are building defensive arsenals with these tools, but the intruders are still slipping through the digital “doors and windows” left open and unlocked by the organization....

You’re Going to Get Hacked. And Anti-Virus Won’t Save You.

The security industry is failing. Not failing to make money, of course: Gartner estimates worldwide industry spending will more than double by 2020. The failure, our failure as an industry, is that breaches continue to outpace the investment. Last year alone, budgets swelled 24%, while the number of security incidents rose 38%, according to PwC....

Stealing E-mails, Let Me Count the Ways

The recently publicized hack of the Democratic National Committee has brought an incredibly common form of data theft back into the spotlight: intrusions that target e-mails. The knee-jerk response to such breaches often advocates controls like message encryption and two-factor authentication. In reality, preventing, detecting, and responding to these attacks is much more complicated. An...

With Importance Comes Duty

Fortune Magazine recently named Tanium one of the 25 most important private companies of 2016, recognizing the most influential private enterprises for their “prodigious revenues or assets, their social currency, their deep connection to our daily lives and their disruptive impact.” It’s an honor to be included among such an impressive list of companies challenging...

It’s Time to Get Serious About Ending Endpoint ‘Tool Bloat’

Have you managed to acquire a pile of security tools in your organization that sit unused? It’s a common issue and it’s one we see a lot in the endpoint security space. If all these products did what they said on the box or in their marketing collateral, it wouldn’t be nearly such a costly...

What’s Next in Endpoint Security: Announcing Tanium Protect™

A decade or more ago, the choice for how to allocate precious information security dollars was easy. The reality of today is much more complex. Everyone knows the limitations of traditional information security tools such as antivirus, which is still often required for regulatory or other reasons. With the potentially high cost of a breach...

Seeing the Truth

The security industry is failing. Information Security spending is increasing year after year, yet breaches continue to outpace the investment. Last year budgets swelled another 24%, while the number of security incidents rose 38%.[1] When an entire system is spending more money only to realize the problem is getting worse, the system is broken. And...

In Conversation: Nasdaq’s Brad Peterson and Tanium’s Orion Hindawi on the Six Questions Every Board Must ask their InfoSec Leadership

When facing a massive data breach, a company’s status quo — and perhaps its very existence — can all be gone in a matter of seconds. Tanium co-founder & CTO Orion Hindawi and Brad Peterson, Executive Vice President and Chief Information Officer for Nasdaq, understand better than most that countless companies are teetering on the brink of a preventable...

Rethinking the Investigation Phase of the Endpoint Security Lifecycle: A Closer Look at Tanium Trace

A frequently-cited metric when examining the current state of incident detection and response is “dwell time.” Research consistently highlights a significant gap — often measured in months — between the time at which a compromise occurs and when the victim ultimately detects the intrusion. We can all agree this gap serves as a useful barometer for measuring the success...