The Benign True Positive Challenge

 

Recently, we posted an example of something we see a lot at Morphick; we have come to call them “benign true positives,” simply because the name “true-positives-but-without-any-associated-risk-so-kind-of-a-false-positive” seemed too long.  While the previous blog post discusses a microcosm example of this, let’s give some other examples (this list is certainly not all-inclusive, but hopefully you’ll get the idea):

Morphick Recognized as a Representative Vendor in Gartner’s Market Guide for Managed Detection and Response Services

 

CINCINNATI — Gartner recently released a new market guide for Managed Detection and Response “MDR” services. “MDR services are an emerging group of security monitoring providers with approaches that do not fit the traditional managed service model. In this report, Gartner named Morphick as a representative vendor in this space.

Identify and prioritize business initiatives with a Security Defense Assessment

 

Company leaders worldwide are constantly asked to improve the performance and security of their businesses. I was asked to do the same when I was a CISO. These goals seem to conflict, but they do not if you adopt a broader mindset. To do so, you have to first take a very pragmatic view of what the security industry is selling. 

What is Analytical Pivoting™?

 

I have always liked a good heist movie. Ocean’s Eleven, The Italian Job, The Great Train Robbery, there are a ton of good examples. What always strikes me in these movies is not just the great lengths the criminals go to in order to pull off their heist, but it strikes me that while the heist is going on, the people protecting whatever it is, are completely unaware they are being robbed until it is too late. This strikes me because it is also very true in the cyber security world.

From the back room to the boardroom – making IT security a business partner

 

Security has become an important topic in the boardroom and based on consistent news of new data breaches, that will probably not change any time soon.  Many security leaders are now finding themselves in regular meetings with CEOs and board committees.  In these meetings, many of them experience what can be described as a culture clash.

Morphick releases free tool to identify homograph based attacks.

 

Morphick Cyber Security is seeing a dramatic increase in the number of companies receiving malicious emails trying to entice them into sending fraudulent wire transfers. These emails are coming from scammers who are trying to dupe their victims into transferring funds to an account the scammer owns.

Morphick Raises $10M In Series A Funding to Meet Demand as Businesses Look to Implement Defenses That Can Change as Quickly as Attackers Change Their Strategies

 

Orchard Holdings Group leads investment to grow Morphick’s global sales, marketing, and services portfolio

Are your defenses advanced and persistent?

 

Catching an advanced attack is hard. It’s even harder to catch the second, third, or fourth attack.

Advanced Persistent Threat. With the term APT being largely overused, the standard marketing has finally caught up and numbed us to the phrase “advanced detection.” But that’s a different story for a different day. Instead, let’s talk about how we at Morphick feel the “persistence” concept is a little underserved. It is one thing to detect and stop an attack. It is a different thing altogether to stop the second, third, and fourth attack from the same, persistent attacker. 

How do the big guys do cyber security?

 

It may seem hard to remember, but several years ago  data breaches were not regularly in the news. There were only a few breaches, mostly at defense contractors, in the news back then. These companies were some of the few that had to take the threats very seriously at the time. These were the organizations that created processes and technology that allowed them to successfully defend themselves. Out of the fires of their experiences, today’s companies can learn a lot.

DefCon Reminds Us That There Are Always New Ways to Evade Security

 

Covering this year’s DefCon, NBC Nightly News sat down with attendees to find out what all could be hacked. 

As it turns out, pretty much everything can be hacked.