2018 in Review: Beyond the FUD
Looking back over 2018, we saw the good and bad that comes with widespread use and abuse of the Internet. Data breaches continued throughout the year, with several in 2018 being among the largest of...
View ArticleYear In Review: Our Top Posts From 2018
Happy New Year! Before we dive back in, we wanted to take a quick look back at a few of your favorites. Here are our five most popular posts from 2018:#1 - Putting the MITRE ATT&CK Eval into...
View ArticleElevator Assets: Building Your Mission-Focused Team
I recently had a great time as a guest on the CISO/Security Vendor Relationship podcast with David Spark and Mike Johnson, CISO of Lyft. Part of our discussion focused on the challenges of hiring in...
View ArticleIs MITRE ATT&CK the New “Next-Gen”?
It’s been 18 months since Endgame became the first endpoint protection vendor to go through a publicly disclosed ATT&CK tactics-based simulation run by the MITRE Corporation. Our early adoption and...
View ArticleHere's How We Do The Numbers
I spoke to a few IT leaders around the HIMSS conference last week. All of them expressed both a knowledge of the ATT&CK matrix and recent evaluations, and most of them also confessed to confusion...
View ArticleOn Military-grade, MITRE ATT&CK™, And You
To quote our very own Ian McShane (so he doesn’t always have to quote himself), “there are many things US military and commercial organizations don’t have in common: clothes, transportation, hopefully...
View ArticleWhy We Release Our Research
Last week in an unprecedented move, researchers at OpenAI stated that with the announcement of their powerful new language model, they would not be releasing the dataset, code, or model weights due to...
View ArticleGoing “Deep” with Artemis 3.0
Over two years ago we announced Artemis, Endgame’s natural language interface to facilitate and expedite detection and response. During that time, we’ve learned how security workers employ the...
View ArticleMilitary Appreciation Month: Employee Perspectives
With observances including Memorial Day, Military Spouse Appreciation Day, and Armed Forces Day, it’s fitting that May has been designated Military Appreciation Month. It’s also a special month to...
View ArticleWhat is Reflex?
We are excited to announce the release of Reflex™. Reflex is the first technology to move customized protection within reach of security teams, combining a flexible architecture, query language, and a...
View ArticleJoining Forces with Elastic
We are excited to announce that Endgame has entered into an acquisition agreement to join forces with Elastic N.V. (NYSE: ESTC). Together, we will bring to market a holistic security product that...
View ArticleInvestigating HTTP2 performance with Go
At Endgame Engineering, experience has shown us that small errors in the edge cases of web service connection lifecycles can eventually contribute to production outages. So we believe it’s worth the...
View ArticleGetting Things Done with Endgame 3.10
Cyber security. It’s not always about hunting down the bad guys and gals. Sometimes you just gotta get things done, but getting things done is hard. There are many, many vendors in the EDR/EPP space...
View ArticleEndgame Completes Successful SOC 2 Compliance Audit
Today, Endgame is excited to announce that we have successfully completed the Service Organization Control (SOC) 2 Type 1 audit. Conducted by an independent third party, the audit affirms that...
View ArticleEQL’s Highway to Shell
It has been an exciting summer in the security community for the Event Query Language (EQL) as we delivered presentations at Circle City Con and Bsides San Antonio. These talks showcased creative ways...
View ArticleExtending EMBER
Last year, Endgame released an open source benchmark dataset called EMBER (Endgame Malware BEnchmark for Research). EMBER contains 1.1 million portable executable (PE file) sha256 hashes scanned in or...
View ArticleMachine Learning Static Evasion Competition
As announced at DEFCON’s AIVillage, Endgame is co-sponsoring (with MRG-Effitas and VM-Ray) the Machine Learning Static Evasion Competition. Contestants construct a wihte-box evasion attack with access...
View ArticleVisualizing Security Data with Canvas
As we have explored in prior blog posts, Endgame uses Elasticsearch as its main data store for its alerts and investigation workflows. Moreover, a number of our customers and prospects rely on...
View Article