RESOURCE CENTER

RESOURCES

Osquery Windows Process Event Auditing

State of Osquery Process Auditing Facebook’s Osquery is a proven, lightweight tool to gather process information from endpoints. Osquery has a concept of “tables”, similar to a database, that provide a SQL interface to structured data. It’s important to understand the 2 different types of tables, normal and event, which operate very differently. Let’s dive […]

Proactive Managed Detection & Response (MDR) Services

State of Insecurity Today’s enterprise security continues to be defeated by red teams, penetration testers, and adversaries alike. The 2018 FireEye/Mandiant M-Trends report found the median time from compromise to first detection was 101 days (up from 99 days in 2016) in 2018. Additionally, subsequent containment and remediation efforts often take weeks or months to […]

DarkBytes GDPR Solution Overview

GDPR Has Arrived There’s been a lot of noise around General Data Protection Regulation (“GDPR”) since it’s gone in effect on May 25. You’ve probably received a plethora of “Privacy Policy Update” emails. You’ve also probably read articles about how disruptive and scary GDPR is for cloud services operating outside of the European Union (“EU”). […]

Endpoint-driven Network Visibility

Modern Networks Today’s enterprise networks are diverse and distributed. Bring-your-own-device (“BYOD”) has turned the internal network into the wild-wild west. Remote offices and acquisitions have added less trustworthy devices into the network. Not only that, many devices are often on-the-road and connecting from external coffee shops or airports with no internal network connectivity at all. […]

Monitor Critical Windows Updates (CVE-2018-0886)

Introduction Microsoft announced critical security updates this week to patch remote code execution vulnerabilities in the Credential Security Support Provider protocol (CredSSP) for nearly every version of Windows. This vulnerability allows a remote attacker to obtain remote code execution via a man-in-the-middle attack. In other words, if an attacker can get himself into the network […]

Webinar: Defeating Phishing Attacks

This webinar will dive into how DarkBytes proactivley defeats phishing attacks. We’ll demonstrate how a malicous, email-delivered Microsoft Office macro is automatically identified and contained using DarkBytes Respond.

Video: 1-Minute Introduction

This short 60-second introduction video explains what problems DarkBytes is solving with our products and services.