Skip to main content

NEWS & BLOG

Stay up to date on cyber trends and industry insights.

 

All articles

Securing Legacy Systems in Healthcare

Data Breach Response: How Healthcare Organizations Can Maintain Trust

CodeHunter Verdicts: Prioritize Threats, Respond More Efficiently

Prioritizing Business Continuity in Cybersecurity Response

Responding to Unknown Malicious Threats: Cybersecurity Analyst's Guide

Cyber-Physical Threats: Malware's Newest Manifestation

Securing the Entertainment Industry's Digital Transformation

Protecting Intellectual Property from Cyber Criminals

How a Defense-in-Depth Strategy Supports Cybersecurity Awareness

The Critical Importance of Cybersecurity Awareness

The Power of Analysis Verdicts: Accelerating The Threat Triage Process

Advanced Persistent Threats: Proactive Defense for Financial Services

The Rising Threat of Algorithmic Trading Exploits

Cybersecurity Market Manipulation: Preventing Fraudulent Activity

Strengthening Transportation Cybersecurity: Lessons from Prior Attacks

Cybersecurity Supply Chain Risks in the Transportation Industry

Defending the Energy Industry from Nation-State Cyberattacks

Defending the Utilities Industry from Emerging Cybersecurity Threats

Cybersecurity For Healthcare CISOs: Safeguard Against Vulnerabilities

Securing Skills: Modern Cybersecurity Hiring Practices

The Importance of Executive Buy-In for Cybersecurity Initiatives

Tackling the Tide of Malicious Email Attachments

The Strengths and Weaknesses of EDR Solutions for Modern Cybersecurity

Beyond the Flag: The Post-EDR Detection Process

Behavioral Analysis: Enhanced Threat Intelligence

Proactive Protection Against Custom Malware

The Complexity of Reverse Malware Engineering: Challenges and Insights

Enhance EDR Capabilities with CodeHunter: A Comprehensive Solution

The Hidden Menace: How to Mitigate Insider Threats

Understanding Multi-Step Malware: Complex Detection and Analysis

Financial Compliance for CISOs in 2024

Third-Party Integration Risk Management: Monitor to Mitigate

Cybersecurity Reporting: Automate Generation to Optimize Workflow

Single Security Platform vs. Integrated Best-of-Breed Solutions

Behavioral Analysis: Beyond Traditional Detection

Cybersecurity Incident Response: Time is of the Essence

Reputation Management: Protect Customer Data and Your Image

Double Extortion: The Latest Malicious Money Grab

Secure Data Backup: What to Know

CodeHunter and SentinelOne: Better Together

Minimize False Positives with Integrated Threat Analysis

Adapting to the Cybersecurity Skills Gap

Train Employees to Reduce Vulnerability to Phishing

Embracing Reality: Managing Cybersecurity Breaches with Resilience

It’s Time to Modernize Your Legacy Applications

Automated Defense Protects Against Software Supply Chain Attacks

Generative AI Makes Hacking Dangerously Easy

Military OPSEC Strategies to Protect Your Business

Proactive Prevention: How to Defend Against Zero-Day Attacks

Strengthening Defense-in-Depth With Automated Malware Detection & Analysis

Malware-as-a-Service: A Top Threat to Organizations in 2024

Elevating Malware Signature Creation to New Heights

The Revolutionary Impact of Zero-Day Malware Identification on the Industry: The Urgency of Addressing Malware Threats

If We Really Cared About the Cybersecurity Talent Shortage…

CodeHunter: Bridging The Cybersecurity Skills Gap

CodeHunter: Staying Ahead of Advanced Malware

CodeHunter Launches New Enterprise Solution

CodeHunter: Automating Cybersecurity

CodeHunter: A New Solution for Federal Cybersecurity

CodeHunter: A New Solution for Financial Services Cybersecurity

CodeHunter: A New Solution for Healthcare Cybersecurity

10 Steps for Writing Software Development Contracts with SSDF in Mind

What Executive Order 14028 Gets Right on Cybersecurity

5 HIPAA Cybersecurity Requirements for CISOs

Sometimes It’s Not About Winning; It’s About Not Losing

5 Banking Cybersecurity Mistakes We See Way Too Often

WTF is Cryptojacking and Why Bank CISOs Should Care

Cyberattack Simulation Exercise for Banks

7 IoT Medical Devices That Are Hackable

You’re Not Their Valentine, You're Their Victim!

5 Ways Pharma Can Mitigate Third-Party Cyber Risks

The True Cost of a Data Breach in 2022

$1,270,000: Why Hospitals Pay Millions to Recover From a Cyberattack | The Real Cost of Recovering From a Ransomware Attack

Formjacking Exposes Mortgage Lenders to Cyber Threats

11 Wild Ransomware Attack Statistics for 2022

Should Hospitals Pay Off Cyber Terrorists?

The Nauseating Truth About FIN12 for Hospital CISOs

Letter From CodeHunter's CEO, Larry Roshfeld: 2022 is the Year of Cybersecurity. AGAIN. (WTF?!)

Call the Feds! What Bank CISOs Need to Do After a Data Breach

Cybersecurity Predictions For 2022 — CodeHunter CEO Larry Roshfeld Featured in Technical.ly

It's 2022. Why Isn’t Everybody Talking About Malware Hunting and Shadow IT?

The Telesurgery Industry Is Flirting With Cyber Criminals

What Is Malware — and Why You Should Give a Sh*t

Post-Pandemic Banks Should Be Ready to Dump Two-Factor Authentication

A Pivotal Time for Innovation in Cyber — CodeHunter CEO Larry Roshfeld Featured in Technical.ly

Letter From CodeHunter's CEO, Larry Roshfeld: Why We Built CodeHunter

CodeHunter COO Chris O'Ferrell Featured in Forbes

How the U.S. Is Raising the Bar on Cybersecurity

Why Executives Should Play Cyber War Games

Why You Need To Reverse Engineer Malware — And Automate Your Analysis

The Emergence of Killware

Insider Threats: The Danger Within Your Own Walls