January 24, 2018 By: Charles Burgess
React in Outlook? How we built the Weekly Indicators Summary
Email has always lagged behind the browser in terms of features and capabilities. While in the latest version of Chrome or Firefox you can play console-quality games, make music, and share your screen, email is a very different story. Getting a layout to look consistent across devices or sharing the joy of an animated GIF are things we take for granted on the web, but can be frustrating to deliver to your inbox....Read More
January 21, 2018 By: Wes Spencer
Supercharge your SOC: 3 security playbook ideas with the Perch API
Security automation is all the rage these days, and for good reason. Repetitive, time-consuming tasks are not only a resource drain, but they can cause rather significant security gaps as well. These manual and repetitive tasks are prone to analyst error and carelessness but are also monotonous drudgery that can leave quality talent looking for more interesting jobs. For most CISOs, turning to security automation and orchestration through the use of playbooks is becoming a step in the right direction....Read More
December 12, 2017 By: Wes Spencer
Visa and Perch Security Partner to bring Visa Threat Intelligence to SMB merchants
Perch has teamed up with Visa in a technology partnership with Perch Security’s Community Defense Platform to expand the reach of Visa Threat Intelligence (VTI) to a broad base of merchants.
Check out the full article here.
October 6, 2017 By: Wes Spencer
Customer Insights: John Nelson reacts to the HITRUST and American Medical Association Cyber Risk Announcement
In late September, HITRUST and the American Medical Association announced a partnership to provide education on cyber risk management to healthcare organizations across the US. Their efforts focus on information security risk management, HIPAA compliance and cyber security; with recommendations specifically tailored for small practices, who often lack the resources and personnel that larger organizations have. Today I spoke with John Nelson, Systems Administrator / Security Officer for U.S. Expediters, Inc....Read More
September 21, 2017 By: Wes Spencer
CCleaner: how to use Perch to confirm you weren't compromised
Cisco’s Talos research team published a blog post Monday covering another supply chain attack involving CCleaner, the well-known and popular system maintenance software. According to Cisco: For a period of time, the legitimate signed version of CCleaner 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner. Attacks like this against a trusted supply chain between the software manufacturer and the customer are a growing attack vector due to its potential effectiveness and impact....Read More
July 19, 2017 By: Chris Fauerbach
Fishtech Group Announces Strategic Investment and Partnership with Perch Security
Fishtech Group today announced a strategic investment in Perch Security, the information security maverick that combines innovative application design with an in-house security operations center (SOC). This new partnership seeks to expand Perch’s sales and marketing efforts, and to broaden and accelerate product development.”
June 28, 2017 By: Chris Fauerbach
Perch partnership program produces practical problem-solving – not panacea – for health care info security challenges
National Health Care Information Sharing and Analysis Community (NH-ISAC) has rolled out an offer for their members that incorporates Perch’s “extremely affordable and simple way to detect and mitigate against threats.”
January 25, 2017 By: Chris Fauerbach
Perch detected Grizzly indicators (before it was cool)
Just like always, Perch detected indicators for the infamous Grizzly Steppe minutes after DHS released them. Read about how we were able to diffuse any panic or confusion for our users before “the Russians are coming” even hit the news that day.
Check out the full article here.
January 12, 2017 By: Chris Fauerbach
Other People's Analysts
Over the last 6 years, I have been entrenched in Cyber Security. Packet capture Network Forensics Identity and Access Management Threat Intelligence During my nPulse Technologies days (acquired by FireEye), I relearned all the network packet stuff that I had been taught in college. The OSI network layers, VLANs, Q-in-Q… oh boy! Reassembling packets (with python no less) was a REALLY fun exercise… never made it into the product, since there were open source tools that did it better (faster?...Read More
January 11, 2017 By: Chris Fauerbach
Tackling Expensive and Complicated Information Security
Information Security: It doesn’t have to be so expensive (or complicated!) The Bad News For Small/Medium Businesses (SMBs), you can’t approach information security the same way your bigger brothers do. Face it, Capital One has a much larger information security (infosec) budget than the Downtown Credit Union in Powhatan, VA. Small companies don’t have the same staffing models, technology expertise or highly specialized analysts that focus solely on protecting data. Sure, there are free and open source tools, for example, but they still require expertise and time to get them up and running, not to mentioned tuned, maintained, updated, etc!...Read More