detailed virtual planet

Improving Incident Response with Autonomous System Numbers

Phil Hagen

Once the sole domain of network operations teams, the Autonomous System Number has become a valuable data point for the digital forensic and incident response team as well. Autonomous System Numbers, or AS Numbers, designate the owner blocks of IP addresses. For example, an ISP like Comcast Communications owns thousands of net blocks consisting of millions of IP addresses – … Read More

Reflections on PowerShell Abuse: Webinar Recap

Keith McCammon, Chief Security Officer

Thank you once more to everyone who took the time to attend our PowerShell abuse webinar. We had fantastic attendance, and many more questions than we were able to answer. If you missed the webinar, or if you loved it so much that you’d like to watch it again, you can view it here. I thought I’d take a moment … Read More

Back in [Carbon] Black

Brian Beyer

Yesterday’s big news in the endpoint detection and response market is the evolution of Bit9+Carbon Black to the simple and sleek Carbon Black. As the earliest Carbon Black partner using the product when it was first being prototyped, we at Red Canary are very excited to continue building our technology and service alongside Carbon Black for three primary reasons: 1. Carbon … Read More

Ransomware is not going away: Prepare or pay up

Phil Hagen

In case you’ve been fortunate enough to avoid it, Ransomware is a security plague that encrypts victims’ files, requiring a complex and expensive payment to free those files.  There is no denying that ransomware schemes have become one of the most popular means of criminal revenue generation. The reason ransomware and related threats are becoming more common is for one … Read More

Meta-Analysis: Analyzing the Efficiency of our Data Analysts

Chris Rothe

Data plays a pretty important role for us at Red Canary. Being a cyber-security company, we monitor hundreds of millions of events every day in search of potential cyber threats to businesses around the world. Data drives everything from growth and profitability to our technology stack, and yes, even to how we measure and improve the productivity of human beings … Read More

Endpoint Detection & Response (EDR) Evaluation Guide: 13 Questions You Need to Answer

Cory Bowline

With endpoint security spending forecasted to grow annually by 48% through 2020, thousands of companies are including Endpoint Detection and Response (EDR) products and services in their security posture. During our discussions with many of those companies, we’ve seen many struggle to define the right questions to ask vendors in this newly developing market. We’ve compiled the following list of questions from both some of … Read More

5 InfoSec Lessons from Star Wars: The Force Awakens

Brian Beyer

It’s beginning to feel a lot like Christmas with 12″ of snow outside our headquarters in Denver, incessant car commercials on TV, and a brand new Star Wars movie! And as much as we hate every company in the world co-branding with Star Wars (looking at you Chrysler), we’re jumping on board long enough to highlight similarities between the movie and what … Read More