Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
Intel patches for the Meltdown and Spectre vulnerabilities have been attributed with causing loss of data or corruption of data in certain cases. Intel is advising customers to refrain from updating their firmware until full patch testing is complete. Windows has released an out of band patch (KB4078130) that keeps protection for vulnerability variants 1 (CVE-2017-5753) and 3 (CVE-2017-5754),while removing the problematic fix for variant 2 (CVE-2017-5715) [1].
AMD processors are not affected by Meltdown. Early patches for AMD devices against Spectre caused an error that left some AMD devices unbootable. The issue has been fixed and patches are available.
Issues with Microsoft’s security updates and Antivirus compatibility were reported early on. Microsoft will not deliver Spectre and Meltdown patches unless the AV vendor has added a specific registry key. Windows Defender Antivirus, System Center Endpoint Protection, and Microsoft Security Essentials are all patch compatible.
Performance issues relating to security patches vary depending on the OS version and the age of the machine. At this time it does not appear that either the Meltdown or Spectre vulnerabilities have been exploited in the wild. Opportunistic threat actors have attempted to capitalize on the confusion surrounding these vulnerabilities by inserting malware into fake non-vendor patches [2].
[3] https://www.catalog.update.microsoft.com/Search.aspx?q=KB4078130
[4] https://newsroom.intel.com/wp-content/uploads/sites/11/2018/01/microcode-update-guidance.pdf