Protecting the Crown Jewels Charles Herring

Summary of the features in StealthWatch 6.5 that protect sensitive data from theft by insider threat or advanced attack.

Coaxing Heads from the Security Sand Charles Herring

Some organizations have chosen to adopt a "plausible deniability" strategy to InfoSec. This article outlines some methods of helping these organizations move to a safer security practice.

School of NBAD Series: NBAD Signature Detection Charles Herring

In the second part of the NBAD series, signature detection methodologies are examined.

When An Alarm Isn’t

Vendors like to create an ocean of alarms in their products so they can dogpile after an event and claim that "they caught it." This article goes through the dangers of false positives in incident response and how to address them.

Dealing with Insider Threats Charles Herring

The most dangerous and difficult risk to detect to an organization is insider threat. When a trusted asset decides to betray the trust of his benefactor for the sake of ideology, greed or extortion the organization can suffer long lasting damage. This article outlines the nature and strategies of handling insider threat.

Subscribe to Lancope Blog