Processing IOCs in the StealthWatch System Threat data contained in Indicators of Compromise (IOC) can be applied against the data stored in StealthWatch to look for markers of historical breach. This entry outlines the steps in performing this analysis. Read more about Processing IOCs in the StealthWatch SystemCharles Herring's blogComments1917 reads
Protecting Windows XP from Exploit With Microsoft discontinuing support of Windows XP, organizations need guidance on how to protect the legacy machines they can't replace. Read more about Protecting Windows XP from ExploitCharles Herring's blogComments1932 reads
Day Zero Is How Long??! We are taking a retarded amount of time to discover unknown (zero day) threats and how we can reduce that window. Read more about Day Zero Is How Long??!Charles Herring's blogComments2707 reads