Podcast – Compromise Intelligence: A New Approach to Cybersecurity

7 March 2020

Listen to our CEO, Karim Hijazi discuss what compromise intelligence is and is not.

https://podcasts.apple.com/us/podcast/compromise-intelligence-new-approach-to-cybersecurity/id1242104988?i=1000468649170

Cybersecurity is always a fun topic. Everyone knows it’s important, but most only do the bare minimum to prevent attacks.   Case in point: Whenever I ask people about their tech stack, they always list a ton of free addon apps they use.   What I hear is a list of vulnerabilities an attacker can gain access through.    And most companies are completely unaware.    But today’s guest, Karim Hijazi, sees these vulnerabilities every day. Karim is CEO at Prevailion, which provides a compromise intelligence platform that companies can use to monitor compromises to their system in real-time.    We talked about:   – What a compromise intelligence platform is (and isn’t)   – Why fighting off attackers is asymmetrical warfare   – The future of cyber insurance This post is based on a B2B Revenue Executive Experience podcast with Karim Hijazi. Subscribe to hear this episode and many more like it.   If you don’t use Apple Podcasts, you can find all our episodes here.

The Latest

DarkWatchman: A new evolution in fileless techniques.

Authored by: Matt Stafford and Sherman Smith Executive summary: In late November, Prevailion’s Adversarial Counterintelligence Team (PACT) identified what appeared to be a malicious javascript-based Remote Access Trojan (RAT) that uses a robust Domain Generation Algorithm (DGA) to identify its Command and Control (C2) infrastructure and that utilizes novel methods for fileless persistence, on-system activity, […]

Shopping online safely with Karim Hijazi – WWL First News with Tommy Tucker

Tommy talks with Karim Hijazi, CEO of Prevailion.

SNIPPET – Live DNS Security Validation

IS YOUR CYBER SECURITY FAILING? See if your company, your competitors or even your next M&A target has failing security controls. Fedex Elevated There are previous or recent attempted communications with threat actor infrastructure. There is high confidence that the communication has a malicious origin. (see JS) Tell Me More About Security Validation

Copyright 2022 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.