Endgame New Release: Outpace the Attacker with Precise Attack Visualization...
Today, we released the 2.5 version of the Endgame platform. This new release extends the scope, speed, and simplicity of our platform with new prevention, detection and response, and automated threat...
View ArticleStopping Certified Malware
Malware authors frequently add signatures from expired or compromised certificates to bypass AV products that don’t validate those signatures correctly. Last week, researchers from the University of...
View ArticleHow We Built Our UI
Last year, we had that rare opportunity to reflect upon our UI architecture and evaluate whether it would continue to serve us going forward. In the end, we decided to take a fundamentally new...
View ArticleThe Cyber Diplomacy Act: What It Is & Why It Matters
Yesterday, the House Foreign Affairs Committee voted on numerous bills by voice vote. The Cyber Diplomacy Act (CDA) was included in this legislative push. First introduced in September, the Cyber...
View ArticleThe Future of War: A Conversation between Nicole Perlroth & Nate Fick
Last week, Endgame CEO Nate Fick and The New York Times reporter Nicole Perlroth discussed the future of cyberwar and its impact on national security at the Computer History Museum in Mountain View,...
View ArticleEndgame full-stack protection achieves HIPAA compliance
When WannaCry ransomware paralyzed and created chaos throughout Britain’s National Health System earlier this year, it became abundantly clear that hospitals and healthcare providers are not immune to...
View ArticleIndictments & Countering Cyber Crime: Yesterday's Indictments in...
After six years of coordinated cyber attacks and data theft, the U.S. Department of Justice (DoJ) issued indictments yesterday against three members of the Chinese threat group known as APT 3 or Gothic...
View ArticleAmplifying the Voice of Women in Cybersecurity: A Pop-Up Workshop with FPI
Since 2013, the Worldwide Threat Assessment of the U.S. Intelligence Community has listed the cyber threat as the number one national security and economic security threat. From interference in global...
View ArticleEndgame Arbiter®: Solving the 'Now What?' Problem
Many security products provide a never-ending stream of alerts, and fail to provide the necessary context and capabilities to support the next stage of analysis. For an analyst to grasp the...
View ArticleHow the Endgame Platform Supports GDPR Compliance
With less than six months to go before the European Union’s General Data Protection Regulation (GDPR) goes into effect, companies are still uncertain if or how it will impact them. A recent study found...
View ArticleEndgame Is Compatible with the Spectre/Meltdown Patches
A newly released processor vulnerability has quickly sparked the first major security panic of 2018. With terms like Kernel page table isolation, speculative execution, and cache timing, it is...
View ArticleDetecting Spectre and Meltdown Using Hardware Performance Counters
For several years, security researchers have been working on a new type of hardware attack that exploits cache side-effects and speculative execution to perform privileged memory disclosure. Last week,...
View ArticleThe March Toward Data Localization
Policy and law lag behind technological change. Nowhere is this more obvious than in infosec, where legal and policy frameworks remain mired in Cold War debates despite over two decades worth of high...
View ArticleGetting Started in Information Security
For many, entering the information security (infosec) industry is elusive and confusing, with mixed signals and conflicting information about what background or skills are required. The reality is that...
View ArticleEndgame Named "Visionary" in Gartner Magic Quadrant for Endpoint...
I’m excited to share that Gartner has named Endgame a “Visionary” in the 2018 Magic Quadrant for Endpoint Protection Platforms. Gartner initially explored the entire market of endpoint vendors. Of the...
View ArticleProve it!: A 2018 Wave in Information Security Machine Learning
Over the last several years, various waves of machine learning (ML) adoption have disrupted information security products and services. Based on my limited retention of electromagnetic wave...
View ArticleStopping Olympic Destroyer: New Process Injection Insights
The International Olympic Committee confirmed that the 2018 opening ceremonies experienced a range of digital attacks, resulting in internet disruption and containing the capability to cause...
View ArticleWhat's Yours is Cryptomine: How Endgame Stops WannaMine
Cryptomining malware has garnered significant attention in light of a range of disconnected and impactful incidents, including attacks on water utilities, hospitals, Android devices and government...
View ArticleMalicious Use of Artificial Intelligence in InfoSec
Heading into 2018, some of the most prominent voices in information security predicted a ‘machine learning arms race’ wherein adversaries and defenders frantically work to gain the edge in machine...
View ArticleThe Making of Endgame MalwareScore® for Mac
Last year, we introduced Endgame MalwareScore®, a machine learning malware detection and protection engine for Windows Portable Executable (PE) files. Since its release, MalwareScore has proven capable...
View Article