Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

Endgame New Release: Outpace the Attacker with Precise Attack Visualization...

Today, we released the 2.5 version of the Endgame platform. This new release extends the scope, speed, and simplicity of our platform with new prevention, detection and response, and automated threat...

View Article


Stopping Certified Malware

Malware authors frequently add signatures from expired or compromised certificates to bypass AV products that don’t validate those signatures correctly. Last week, researchers from the University of...

View Article


Image may be NSFW.
Clik here to view.

How We Built Our UI

Last year, we had that rare opportunity to reflect upon our UI architecture and evaluate whether it would continue to serve us going forward. In the end, we decided to take a fundamentally new...

View Article

Image may be NSFW.
Clik here to view.

The Cyber Diplomacy Act: What It Is & Why It Matters

Yesterday, the House Foreign Affairs Committee voted on numerous bills by voice vote. The Cyber Diplomacy Act (CDA) was included in this legislative push. First introduced in September, the Cyber...

View Article

The Future of War: A Conversation between Nicole Perlroth & Nate Fick

Last week, Endgame CEO Nate Fick and The New York Times reporter Nicole Perlroth discussed the future of cyberwar and its impact on national security at the Computer History Museum in Mountain View,...

View Article


Endgame full-stack protection achieves HIPAA compliance

When WannaCry ransomware paralyzed and created chaos throughout Britain’s National Health System earlier this year, it became abundantly clear that hospitals and healthcare providers are not immune to...

View Article

Image may be NSFW.
Clik here to view.

Indictments & Countering Cyber Crime: Yesterday's Indictments in...

After six years of coordinated cyber attacks and data theft, the U.S. Department of Justice (DoJ) issued indictments yesterday against three members of the Chinese threat group known as APT 3 or Gothic...

View Article

Image may be NSFW.
Clik here to view.

Amplifying the Voice of Women in Cybersecurity: A Pop-Up Workshop with FPI

Since 2013, the Worldwide Threat Assessment of the U.S. Intelligence Community has listed the cyber threat as the number one national security and economic security threat. From interference in global...

View Article


Image may be NSFW.
Clik here to view.

Endgame Arbiter®: Solving the 'Now What?' Problem

Many security products provide a never-ending stream of alerts, and fail to provide the necessary context and capabilities to support the next stage of analysis. For an analyst to grasp the...

View Article


Image may be NSFW.
Clik here to view.

How the Endgame Platform Supports GDPR Compliance

With less than six months to go before the European Union’s General Data Protection Regulation (GDPR) goes into effect, companies are still uncertain if or how it will impact them. A recent study found...

View Article

Endgame Is Compatible with the Spectre/Meltdown Patches

A newly released processor vulnerability has quickly sparked the first major security panic of 2018. With terms like Kernel page table isolation, speculative execution, and cache timing, it is...

View Article

Image may be NSFW.
Clik here to view.

Detecting Spectre and Meltdown Using Hardware Performance Counters

For several years, security researchers have been working on a new type of hardware attack that exploits cache side-effects and speculative execution to perform privileged memory disclosure. Last week,...

View Article

The March Toward Data Localization

Policy and law lag behind technological change. Nowhere is this more obvious than in infosec, where legal and policy frameworks remain mired in Cold War debates despite over two decades worth of high...

View Article


Getting Started in Information Security

For many, entering the information security (infosec) industry is elusive and confusing, with mixed signals and conflicting information about what background or skills are required. The reality is that...

View Article

Endgame Named "Visionary" in Gartner Magic Quadrant for Endpoint...

I’m excited to share that Gartner has named Endgame a “Visionary” in the 2018 Magic Quadrant for Endpoint Protection Platforms. Gartner initially explored the entire market of endpoint vendors. Of the...

View Article


Prove it!: A 2018 Wave in Information Security Machine Learning

Over the last several years, various waves of machine learning (ML) adoption have disrupted information security products and services.  Based on my limited retention of electromagnetic wave...

View Article

Image may be NSFW.
Clik here to view.

Stopping Olympic Destroyer: New Process Injection Insights

The International Olympic Committee confirmed that the 2018 opening ceremonies experienced a range of digital attacks, resulting in internet disruption and containing the capability to cause...

View Article


Image may be NSFW.
Clik here to view.

What's Yours is Cryptomine: How Endgame Stops WannaMine

Cryptomining malware has garnered significant attention in light of a range of disconnected and impactful incidents, including attacks on water utilities, hospitals, Android devices and government...

View Article

Malicious Use of Artificial Intelligence in InfoSec

Heading into 2018, some of the most prominent voices in information security predicted a ‘machine learning arms race’ wherein adversaries and defenders frantically work to gain the edge in machine...

View Article

Image may be NSFW.
Clik here to view.

The Making of Endgame MalwareScore® for Mac

Last year, we introduced Endgame MalwareScore®, a machine learning malware detection and protection engine for Windows Portable Executable (PE) files. Since its release, MalwareScore has proven capable...

View Article
Browsing all 698 articles
Browse latest View live