1. Achieving GDPR’s Security Requirements with Fidelis Elevate

    Dr. Abdul Rahman |

    In May 2016, the European Union ("EU") published the EU General Data Protection Regulation ("GDPR") which became effective throughout all Member States in 2018. For U.S. companies operating in the EU, or holding themselves out to EU citizens, GDPR expands the concept of “personal data” that i … READ MORE

  2. Examining Different Approaches to Architecting Deception Technology

    Doron Kolton |

    Deception is an emerging technology that gives the good guys a way to literally change the game. How deception is architected and deployed can vary greatly and it’s important for customers to understand the optional Deception Architectures, their advantages and any issues that might be encount … READ MORE

  3. citrix

    Learning from the Citrix Breach

    Tim Roddy |

    Earlier this month news broke of a massive data breach impacting software provider, Citrix. Reportedly, the organization was completely unaware of the compromise until the FBI informed them that up to 10TB of data had been stolen. We still don't know what data was accessed but with a whole host o … READ MORE

  4. RSA 2019 in Review

    Tim Roddy |

    I think it’s safe to say that we’re collectively taking a big breath and recovering from another monstrous RSA. This year we saw the theme ‘Better’ take over the show – encouraging us all to consider how cybersecurity can improve and how organizations can better their own security outc … READ MORE

  5. Fidelis Announces First of its Kind Platform Enhancements

    Sam Erdheim |

    Today we are thrilled to announce an upcoming Fidelis Elevate release which will see the platform become the first of its kind to enable organizations to not only calculate their vulnerable attack surface, but also respond effectively to these insights to build a robust defense. Fidelis Elevate … READ MORE

  6. CRN 100 List

    Fidelis Recognized on CRN’s 2019 Security 100 List

    Sam Erdheim |

    We’re excited to announce that today CRN®, a brand of The Channel Company, has named Fidelis Cybersecurity on its annual Security 100 list, for the third year running. The Security 100 list recognizes the coolest security vendors in each of five categories: Endpoint Security; Identity Managem … READ MORE

  7. Hunting ATT&CKs: A Framework for Success

    Justin Swisher |

    Threat Hunting. MITRE ATT&CK. These words have been thrown around, mashed together, and forced upon the cyber security world en masse lately. There is no shortage of blogs on each, or on the combination of both – trying to explain them, define them, or show how they matter to every organization … READ MORE

  8. Threat Landscape

    Building a Terrain Based Cyber Defense Strategy

    Dr. Abdul Rahman |

    Not who, not how…but where Across the globe, organizations are being attacked by well-funded hacking groups who succeed in breaching traditional perimeter defenses. These attacks serve to remind us that we can no longer rely entirely on preventive security measures. The reality is that if a gr … READ MORE

  9. Shabak Challenge

    Solving Cyber-Crimes as Agent A

    Rami Mizrahi |

    Spoiler alert! In this blog, I’ll be outlining our approach to solving a cyber challenge that has been posted by the Israeli Secret Service (Shabak). This is not a traditional hacking challenge, but rather focuses on software engineering and data science. The Israel Secret Service, Shabak, try … READ MORE