January 2017

January 2017

Jan 302017


How did Armor stop a SQL injection attack against multiple banking sites – all in less than eight hours? The SQL injection attack The experts in our Security Operations Center use best-in-breed tools to constantly monitor our customer’s environments. So when threat actors attempted a SQL injection attack on a banking customer’s eCommerce sites, we […]

Jan 262017

Where’s Your Security Spend Focused?

Finding the balance between spend on talent v.s. cloud security tools Not long ago, it was common for executives to write blank checks to their IT departments for them to go buy whatever security tools they needed to secure their data – with almost everything getting approved. Those sloppy approvals meant ineffective—and sometimes unnecessary—tools were […]

Jan 192017

Oh #@$%! You’ve Been Breached: Part Two

Picking up where we left off in the last blog, we will cover the next two steps in our breach response process: preserving artifacts and stopping the bleeding of data from your environment. This blog features excerpts from our upcoming white paper, Oh #@$%! You’ve Been Breached. Step Two: Preserve Artifacts Once you have the team […]

Jan 112017

MongoDB Ransomware – Swift Action is Key

| Head of the Threat Resistance Unit

News of a massive ransom campaign against MongoDB is raising significant alarms. While extortion is not new as a criminal act, the unique ways it is being applied to technology and the evolution of ransomware into broader, more impactful campaigns is a new phenomenon. In the case of MongoDB, originally a lone hacker began aggressively compromising, […]

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Jan 92017

Oh #@$%! You’ve Been Breached: What To Do Next

If you came home to discover your home had been broken into, would you clean up the evidence while waiting for the police to arrive – restoring your home to how it was pre-break in? Hopefully, the answer is ‘no’. And not just insurance reasons. Preserving the scene of the crime is crucial to learning […]

Jan 32017

Cyber Security in 2017: What Should We Expect?

Originally featured on vmblog.com This time of year brings a slew of “predictions” from security-minded experts. While this is a format that most have come to expect, with clear indications of storms brewing on a number of fronts, I thought I’d adapt to terminology that better describes what lies ahead  – a “forecast.” The desire […]