Monthly archives: March, 2015

Chuck Leaver – Narrow Indicators Of Compromise Make Comprehensive Endpoint Monitoring Difficult

Presented By Chuck Leaver And Written By Dr Al Hartmann Of Ziften Inc.   The Breadth Of The Indication – Broad Versus Narrow A thorough report of a cyber attack will generally provide information of indicators of compromise. Typically these are slim in their scope, referencing a specific attack group as viewed in a particular



How Ziften Continuous Endpoint Monitoring Deals With Indicators Of Compromise Carbanak 3 – Chuck Leaver

Presented By Chuck Leaver And Written By Dr Al Hartmann   Part 3 in a 3 part series   Below are excerpts of Indicators of Compromise (IoC) from the technical reports on the Anunak/Carbanak APT attacks, with talk about their discovery by the Ziften continuous endpoint monitoring system. The Ziften system has a focus on



Chuck Leaver – Continuous Endpoint Monitoring Efficiency Revealed In Carbanak Case Study Part Two

Presented By Chuck Leaver And Written By Dr Al Hartmann   Part 2 in a 3 part series   Continuous Endpoint Monitoring Is Very Efficient   Capturing and blocking malicious software before it has the ability to compromise an endpoint is fine. However this approach is largely inadequate against cyber attacks that have actually been



Chuck Leaver – Carbanak Case Study Part One And The Case For Continuous Endpoint Monitoring

Presented By Chuck Leaver And Written By Dr Al Hartmann     Part 1 in a 3 part series Carbanak APT Background Particulars A billion dollar bank raid, which is targeting more than a hundred banks across the world by a group of unknown cyber criminals, has remained in the news. The attacks on the