The following infographic summarizes key results from our 2015 Cyberthreat Defense Report. To download the full report, visit https://cyber-edge.com/cdr-2015.

Blog
In part 1 of our 2015 Cyberthreat Defense Report blog, next-generation endpoint defenses and threat intelligence services were introduced as two emerging areas of interest…
Palo Alto Networks’ acquisition of Cyvera earlier this year got me thinking about the evolution of endpoint defenses. It’s been obvious for quite some time…
Detecting threats, especially new/unknown ones, will always be an imperfect science. That said, it appears the latest generation of threat detection technologies has been doing…
Somewhat overshadowed by the Verizon Data Breach Investigations Report, which also came out in April, the fifth-annual M-Trends® report from Mandiant® (a FireEye company) provides…
Like its predecessors, the 2014 Verizon Data Breach Investigations Report (DBIR) is a treasure trove of real-world information about the cyberthreat landscape. A big change…
Once again, I made the pilgrimage to San Francisco for the RSA Conference (Feb 24-28). In many ways, the 2014 edition was the same as…