Implementation is simple. »
The Benign True Positive Chall…
Recently, we posted an example of something we see a lot at Morphick; we have come to call them “benign true…
Learn More
 
Morphick Recognized as a Repre…
CINCINNATI — Gartner recently released a new market guide for Managed Detection and Response “MDR” services. “MDR…
Learn More
 
Identify and prioritize busine…
Company leaders worldwide are constantly asked to improve the performance and security of their businesses. I was asked…
Learn More
 
What is Analytical Pivoting™?
I have always liked a good heist movie. Ocean’s Eleven, The Italian Job, The Great Train Robbery, there are a ton of…
Learn More
 
From the back room to the boar…
Security has become an important topic in the boardroom and based on consistent news of new data breaches, that will…
Learn More
 
Morphick releases free tool to…
Morphick Cyber Security is seeing a dramatic increase in the number of companies receiving malicious emails trying to…
Learn More
 
Morphick Raises $10M In Series…
Orchard Holdings Group leads investment to grow Morphick’s global sales, marketing, and services portfolio…
Learn More
 
Are your defenses advanced and…
Catching an advanced attack is hard. It’s even harder to catch the second, third, or fourth attack. Advanced…
Learn More
 
How do the big guys do cyber s…
It may seem hard to remember, but several years ago  data breaches were not regularly in the news. There were only…
Learn More
 
DefCon Reminds Us That There A…
Covering this year’s DefCon, NBC Nightly News sat down with attendees to find out what all could be hacked.  As…
Learn More
 
Chinese and Russian Attackers…
Morphick’s Threat Intelligence Team identified a novel technique for maintaining persistence on a remote machine…
Learn More
 
"Malware-less" Attac…
There have been several articles in the last few months addressing the topic of “malware-less” or “malware-free”…
Learn More
 
Separating truth from F.U.D. P…
In the first two posts (Post One and Post Two) we discussed how cyber security problems are not technology…
Learn More
 
Separating truth from F.U.D. P…
In the first post in this series, I discussed how my experiences taught me that the new cyber security risks are not…
Learn More
 
OPM and Anthem Breaches
There has been much reporting that the data breaches at Anthem, and more recently the U.S. Office of Personnel…
Learn More
 
Separating truth from F.U.D. P…
With so many voices now speaking about cyber security and even more technologies and solutions entering the market, I…
Learn More
 
Bringing Sanity to Threat Inte…
This post was inspired by an article I read the other day that highlighted something which struck a chord,  “[m]…
Learn More
 
Compliance vs Security
At the end of the day, what exactly is cyber security and what falls within the scope of a cyber security program? We…
Learn More
 
Gamification of your Global In…
This presentation, originally made by Kevin and Kody McLaughlin at RSA 2015, shows how the Whirlpool Corporation and…
Learn More
 
Importance of a Complete Detec…
When defending against cyber attacks and trying to avoid being hacked, there are a number of things to consider….
Learn More
 
Consumerization of Hacking
When dealing with technology, there is at least one thing that is universally true: what was once difficult and…
Learn More
 
Morphick Defense
Cyber security is a rapidly changing space. Traditionally, it has focused on stopping viruses or malicious programs…
Learn More
 
A Cyber Security Reality Check
You might be skeptical if you heard that a strong cyber security defense focuses on people and processes over…
Learn More
 
Automated Solutions Are Not En…
Advanced Persistent Threats are successful because of IT security vendors. OK, so maybe that’s a bit strong. I am…
Learn More
 
What is Intelligent Analysis a…
Successful cyber-attacks do not just happen. There are a series of steps that an attacker has to go through before they…
Learn More
 
VM Checking and Detecting
I recently noticed a new piece of malware that had made its way into the database. The part that stuck out to me is…
Learn More