Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

2018 in Review: Beyond the FUD

Looking back over 2018, we saw the good and bad that comes with widespread use and abuse of the Internet. Data breaches continued throughout the year, with several in 2018 being among the largest of...

View Article


Year In Review: Our Top Posts From 2018

Happy New Year! Before we dive back in, we wanted to take a quick look back at a few of your favorites. Here are our five most popular posts from 2018:#1 - Putting the MITRE ATT&CK Eval into...

View Article


Image may be NSFW.
Clik here to view.

Elevator Assets: Building Your Mission-Focused Team

I recently had a great time as a guest on the CISO/Security Vendor Relationship podcast with David Spark and Mike Johnson, CISO of Lyft. Part of our discussion focused on the challenges of hiring in...

View Article

Is MITRE ATT&CK the New “Next-Gen”?

It’s been 18 months since Endgame became the first endpoint protection vendor to go through a publicly disclosed ATT&CK tactics-based simulation run by the MITRE Corporation. Our early adoption and...

View Article

Image may be NSFW.
Clik here to view.

Here's How We Do The Numbers

I spoke to a few IT leaders around the HIMSS conference last week. All of them expressed both a knowledge of the ATT&CK matrix and recent evaluations, and most of them also confessed to confusion...

View Article


On Military-grade, MITRE ATT&CK™, And You

To quote our very own Ian McShane (so he doesn’t always have to quote himself), “there are many things US military and commercial organizations don’t have in common: clothes, transportation, hopefully...

View Article

Why We Release Our Research

Last week in an unprecedented move, researchers at OpenAI stated that with the announcement of their powerful new language model, they would not be releasing the dataset, code, or model weights due to...

View Article

Image may be NSFW.
Clik here to view.

Going “Deep” with Artemis 3.0

Over two years ago we announced Artemis, Endgame’s natural language interface to facilitate and expedite detection and response. During that time, we’ve learned how security workers employ the...

View Article


Image may be NSFW.
Clik here to view.

Military Appreciation Month: Employee Perspectives

With observances including Memorial Day, Military Spouse Appreciation Day, and Armed Forces Day, it’s fitting that May has been designated Military Appreciation Month. It’s also a special month to...

View Article


Image may be NSFW.
Clik here to view.

What is Reflex?

We are excited to announce the release of Reflex™. Reflex is the first technology to move customized protection within reach of security teams, combining a flexible architecture, query language, and a...

View Article

Joining Forces with Elastic

We are excited to announce that Endgame has entered into an acquisition agreement to join forces with Elastic N.V. (NYSE: ESTC). Together, we will bring to market a holistic security product that...

View Article

Image may be NSFW.
Clik here to view.

Investigating HTTP2 performance with Go

At Endgame Engineering, experience has shown us that small errors in the edge cases of web service connection lifecycles can eventually contribute to production outages. So we believe it’s worth the...

View Article

Image may be NSFW.
Clik here to view.

Getting Things Done with Endgame 3.10

Cyber security.  It’s not always about hunting down the bad guys and gals.  Sometimes you just gotta get things done, but getting things done is hard.  There are many, many vendors in the EDR/EPP space...

View Article


Endgame Completes Successful SOC 2 Compliance Audit

Today, Endgame is excited to announce that we have successfully completed the Service Organization Control (SOC) 2 Type 1 audit. Conducted by an independent third party, the audit affirms that...

View Article

Image may be NSFW.
Clik here to view.

EQL’s Highway to Shell

It has been an exciting summer in the security community for the Event Query Language (EQL) as we delivered presentations at Circle City Con and Bsides San Antonio. These talks showcased creative ways...

View Article


Extending EMBER

Last year, Endgame released an open source benchmark dataset called EMBER (Endgame Malware BEnchmark for Research). EMBER contains 1.1 million portable executable (PE file) sha256 hashes scanned in or...

View Article

Machine Learning Static Evasion Competition

As announced at DEFCON’s AIVillage, Endgame is co-sponsoring (with MRG-Effitas and VM-Ray) the Machine Learning Static Evasion Competition.  Contestants construct a wihte-box evasion attack with access...

View Article


Image may be NSFW.
Clik here to view.

Visualizing Security Data with Canvas

As we have explored in prior blog posts, Endgame uses Elasticsearch as its main data store for its alerts and investigation workflows.  Moreover, a number of our customers and prospects rely on...

View Article
Browsing all 698 articles
Browse latest View live