Anti Malware

On-access scans can detect malware infections much earlier than scheduled scans by automatically scanning for malware every time a new connection occurs.

Anti Malware


Oct 172018

SANS Seattle Fall 2018

Rachel Chism Image

Rachel Chism

Dec 212017

Dwell Time: A Cybersecurity Metric

How do security professionals know they’re successful in protecting and defending their data? While we rely on several cybersecurity metrics to measure the effectiveness of our efforts, there’s one in particular that many of us here at Armor are passionate about. It’s called dwell time.   What is dwell time and why does it matter?  Dwell time is the duration a threat actor has undetected access in a network until it’s completely removed. Currently […]

Mar 142017

Data Classification and You: How to Improve Organizational Efficiencies and Security

| Head of the Threat Resistance Unit

In the era of big data and analytics, organizations are inundated with information, from business critical intellectual property, to routine employee memos. The diversity of this data makes effective management and classification essential to avoid being overwhelmed under a mountain of ones and zeroes. Data classification is a system of identifying and tagging data so […]

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Nov 172015

Managing Multi-Cloud Environments

Yes, 2016 is the year of the multi-cloud strategy. Whether blended, hybrid, shaken or stirred, multi-could technology will power many of our popular brands, services, applications and platform. But as CIO contributor Stephanie Overby points out, defining this strategy differs based on the respective company, business objectives, size of data workloads and any security or […]