Tag: Blogs
-
CyberHoot’s HootPhish Challenge
What Is the HootPhish Challenge? The HootPhish Challenge trains users how to spot and avoid falling victim to phishing email …
-
TAG Blog Series 4 – An ADX Action Plan for Enterprise
In this 4th blog series, we explore the benefits of Anti Data Exfiltration (ADX) and how BlackFog effectively implements this crucial …
-
TAG Blog Series 3 – How ADX is Integrated by BlackFog
The BlackFog Enterprise product is a comprehensive solution designed to implement ADX for enterprise buyers. At the heart of BlackFog …
-
How to Define Your Security Objectives Before Choosing an MDR Provider
With nearly every MSSP and Security company claiming to do Managed Detection and Response (MDR) it’s more important than ever to choose …
-
Shining a Light in the Dark – How Binary Defense Uncovered an APT Lurking in Shadows of IT
Written by ARC Labs contributors, John Dwyer and Eric Gonzalez In cybersecurity, the threats we don’t see—or don’t expect—often …
-
How Our Dedicated Resources Differ from Staff Augmentation
One of the most frequent questions we get from our clients considering our Dedicated Resources are, “How do your Dedicated Resources …
-
TAG Blog Series 2 – How ADX is Integrated into the Enterprise
Integrating Anti Data Exfiltration (ADX) solutions into an enterprise is crucial for effective cybersecurity. This article examines how …
-
Protect Your Business from Zero-Day Exploits:
Recently, Chinese government-backed hackers targeted U.S. internet providers using zero-day exploits, adding to a string of concerning …
-
TAG Blog Series 1 – How ADX Supports and Implements Policy
Implementing Anti Data Exfiltration (ADX) solutions is critical for enterprise security. This article provides guidance on establishing …
-
Understanding Sleep Obfuscation
By ARC Labs contributor, Dylan Michalak, Threat Research Intern Sleep obfuscation is a term encompassing malware that waits for some time …
●●●