Monthly archives: March, 2017

Chuck Leaver – Observe Specific Commands To Identify Threats

Written By Josh Harriman And Presented By Chuck Leaver Ziften CEO   The repeating of a concept when it comes to computer security is never ever a bad thing. As advanced as some cyber attacks can be, you truly need to watch for and comprehend using common readily available tools in your environment. These tools

Chuck Leaver – Forensic Analysis And Incident Response Are Related But Different

Written By Roark Pollock And Presented By Ziften CEO Chuck Leaver   There may be a joke someplace regarding the forensic analyst that was late to the incident response celebration. There is the seed of a joke in the idea at least however naturally, you have to understand the distinctions between incident response and forensic

Chuck Leaver – The Importance Of Edit Difference First Part

Written By Jesse Sampson And Presented By Chuck Leaver CEO Ziften   Why are the same techniques being utilized by opponents over and over? The basic answer is that they are still working today. For example, Cisco’s 2017 Cyber Security Report informs us that after years of decline, spam email with destructive attachments is once

Chuck Leaver – The Security Of Endpoints Will Be Tougher With The Rise In Connected Devices

Written By Roark Pollock And Presented By Ziften CEO Chuck Leaver   It wasn’t long ago that everyone knew exactly what you suggested if you brought up an endpoint. If somebody wanted to offer you an endpoint security solution, you understood what devices that software was going to secure. But when I hear somebody delicately

Chuck Leaver – Focussing On Detection After Compromise

Written By Dr Al Hartmann And Presented By Chuck Leaver CEO Ziften   If Prevention Has Stopped working Then Detection Is Important The last scene in the well known Vietnam War film Platoon illustrates a North Vietnamese Army regiment in a surprise night time attack breaching the concertina wire perimeter of an American Army battalion,

Chuck Leaver – RSA 2017 Message Is That Enterprises Want Tailored Security Solutions

Written By Michael Vaughan And Presented By Chuck Leaver Ziften CEO   More customized solutions are needed by security, network and functional groups in 2017 A lot of us have participated in security conventions for many years, but none bring the very same high level of excitement as RSA – where the world talks security.