search external-link twitter facebook feed google-plus linkedin angle-left angle-right angle-up angle-down youtube-play
The Hexadite Blog
Expert advice and round-the-web cyber security news to help secure your company. Get the latest industry insights delivered to your inbox.

Sign up and stay up-to-date.

Home>The Hexadite Blog

This Week in Cyber Security News 3.14.16

The third installment of our weekly cyber security news roundup, the past week’s news saw a massive uptick in ransomware coverage, with 2016 referred to as ‘the year of ransomware’. If you’d like to receive a roundup of the week’s cyber security news in your inbox, be sure to subscribe by email. Malware and Ransomware FBI […]

Blog /

Integrated Cybersecurity Orchestration Platforms Take Center Stage at RSA 2016

In a post yesterday entitled “Cybersecurity Industry To-Do List for RSA Conference“, leading writer and analyst Jon Oltsik outlines the emerging trends and themes to be discussed and demonstrated at this year’s RSA show. In the post, Jon questions what the cybersecurity industry has done in the last year to “do more to decrease the attack […]

Blog /

Hexadite Customer Spotlight: IDT Corporation

The first in our series of videos highlighting Hexadite customers, see how Golan Ben-Oni, Global CIO for IDT Corporation uses automation to follow all leads at all times.

This Week in Cyber Security News: 2.22.16

The second issue of our weekly cyber security news roundup. If you’d like to receive a roundup of the week’s cyber security news in your inbox, be sure to subscribe by email. Malware and Ransomware Source code for powerful Android banking malware is leaked By Jeremy Kirk The source code for a powerful Android malware […]

This Week in Cyber Security News – 2/15/16

The second issue of our weekly cyber security news roundup.  Cyber Security Business News Hexadite Gains HP Support in Series A Funding By Tara Seals More good news from the cybersecurity funding world: Hexadite has closed $8 million in a Series A funding round from Hewlett Packard Ventures, Ten Eleven Ventures and YL Ventures, who […]

This Week in Cyber Security News: February 1, 2016

The first in a weekly roundup, highlighting cyber security news and opinion.  Cyber Security Spending Bank of America’s Unlimited Cybersecurity Budget Sums Up Spending Plans In A War Against Hackers By Steve Morgan In a live interview from Davos Switzerland on Bloomberg roughly one year ago, Bank of America Corp. CEO Brian Moynihan said the […]

Blog /

4 Things We Can Learn About Cyber Security from Aaron Lufkin Dennison, 1850s Watchmaker

In an episode of the PBS series “How We Got to Now” (and the book of the same name) author and historian of innovation Steven Johnson connects the dots between Galileo and how our measurement of time enables things like GPS. In doing so, he profiles Aaron Lufkin Dennison, watchmaking innovator, and someone we can […]

Blog /

Overwhelmed by Alerts: How to Keep Up with the Exponential Increase in Cyber Incidents

In the past day, two articles have highlighted the biggest problem faced by incident response teams: the rapid increase in cyber attacks are resulting in thousands of security alerts, overwhelming those that have to investigate and remediate. In “Cutting Through the Noise: How to Manage a Large Volume of Cyber Alerts,” Bill Sweeney offers the […]

Blog /

Automated Incident Response is the Best Weapon Against the Casual Attacker

Recently, Anton Chuvakin, Gartner Research VP, called on companies to get good at fighting basic, commodity attacks. In his blog Defeat the Casual Attacker First!!, he finds it “highly illogical and, in fact, wasteful, to attempt stopping or detecting an advanced attacker before you managed to succeed with a common one.” He has a point! […]

Blog /

“I Love Lucy” as an allegory for the weakness of human operations and the importance of automation

A good old example of why automation in important and how, in many cases, it transcends traditional human-operations and weaknesses (specifically, the common weakness to chocolate…):