Monthly archives: May, 2018

Chuck Leaver – The Lowdown On Whitelisting And Blacklisting

Written By Roark Pollock And Presented By Chuck Leaver   Intro As with any type of security, the world of IT security is concerned with developing and implementing a set of allow/disallow guidelines – or more officially entitled, policies on security. And, simply stated, allow/disallow rules can be expressed as a ‘whitelist’ or a ‘blacklist’.



Chuck Leaver – Here Is How You Hunt Using Windows Defender ATP

Written By Josh Harrimen And Presented By Chuck Leaver   Following on the heels of our current partnership announcement with Microsoft, our Ziften Security Research team has actually started leveraging an extremely cool part of the Windows Defender Advanced Threat Protection (Windows Defender ATP) Security Center platform. The Advanced Hunting feature lets users run queries



Chuck Leaver – Get The Lowdown On RSA 2018

Written By Logan Gilbert And Presented By Chuck Leaver   After spending a couple of days with the Ziften team at the 2018 RSA Conference, my innovation viewpoint was: more of the very same, the typical suspects and the typical buzzwords. Buzz words like – “AI”, “machine learning”, “predictive” were wonderfully worn-out. Lots of attention



Chuck Leaver – How To Deal With Unmanaged Assets In The Cloud

Written By Logan Gilbert And Presented By Chuck Leaver   All of us identify with the image of the masked villain bending over his computer late at night – accessing a corporate network, stealing important data, vanishing without a trace. We personify the enemy as smart, determined, and crafty. But the reality is the large