dwell time

dwell time

Jul 32018

Measuring Dwell Time & Security Operations

| Head of the Threat Resistance Unit

Dwell time is one of the most powerful metrics to measure an organization’s cybersecurity effectiveness against today’s threat landscape. Security teams use it to assess the entire operational process of the security program, from architecture to engineering, through operations and incident response. In turn, key decision makers and stakeholders can look at this metric to […]

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Jun 122018

Reality or Hollywood: Cyberattacks in Pop Culture

| Head of Threat Resistance

It’s well-known and accepted that Hollywood has a knack for being dramatic and embellishing real-life scenarios for the sake of ratings. One topic that’s often grossly misrepresented is cybersecurity and cyberattacks. Somewhere between the stereotypes of a loner dwelling in a dark basement and embedding false information into someone’s brain tissue, lies the truth about […]

Chris Hinkley, OSCP, CISSP

Head of Threat Resistance

As Head of Threat Resistance at Armor, Chris Hinkley utilizes a decade of security expertise to design, test and deploy next generation security processes and techniques for the cloud. His work at Armor was instrumental in Armor being one of the first cloud companies globally to achieve PCI DSS compliance. Prior to Armor, Hinkley worked as a Web Developer for TargetScope, an interactive marketing and Web development company. In that role he created everything from website animations to complex and dynamic product configurations using the latest technology and development frameworks. With Armor, Hinkley has held a number of security and technology-related roles, including security engineer, lead engineer, support manager and lead ethical hacker. In those roles he has serviced thousands of FireHost customer servers, including Windows and Linux, and overseen the security of all hosting environments to meet PCI, HIPAA and other compliance guidelines. Hinkley is a sought after speaker and author on cloud, security and open source topics, publishing regular columns in SecurityWeek and other industry magazines. Hinkley is a Certified Information Systems Security Professional (CISSP).

Jun 72018

Re-Evaluating Dwell Time and Incident Response

| Head of the Threat Resistance Unit

At Armor, we interpret the term ‘dwell time’ to mean the duration a threat is present on a protected system until it has been remediated. However, several security service providers (This generically covers managed security services providers (MSSP), managed detection and response (MDR), and security as a service (SECaaS)) have viewed dwell time in a […]

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Mar 292018

How Do I Become Compliant?

| Chief Compliance and Data Privacy Officer

For many of us, our first glimpse into playing by the rules was guided by classic board games, such as Monopoly, Life, and Operation. If you cheated, your parents and friends likely decided not to play with you. However, if you followed the rules, developing a strategy helped you win. As adults, board games have […]

Nancy Free

Chief Compliance and Data Privacy Officer

Nancy Free, Armor's Chief Compliance and Data Privacy Officer, has over 20 years of IT experience, including IT governance, risk, compliance, and audit. She has spent over 15 years in the IT Security field leading IT and compliance teams in a variety of industries, including: energy, transportation, construction, mortgage lending, healthcare, and retail.

Dec 212017

Dwell Time: A Cybersecurity Metric

How do security professionals know they’re successful in protecting and defending their data? While we rely on several cybersecurity metrics to measure the effectiveness of our efforts, there’s one in particular that many of us here at Armor are passionate about. It’s called dwell time.   What is dwell time and why does it matter?  Dwell time is the duration a threat actor has undetected access in a network until it’s completely removed. Currently […]

Jul 62017

Navigating Microsoft – Preparation Leads to Opportunity

Microsoft is a very large and complex organization that can prove difficult to navigate from a partner perspective.  While aligning a go-to-market plan with this behemoth organization can often seem daunting, it can also be very fruitful for the bottom line.  Fortunately, once a firm grasp of how to best work with the company exists, […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jun 22017

10 Critical Questions to Answer when Hiring Security Analysts

| Head of the Threat Resistance Unit

Finding the best security analysts for your security organization is about finding candidates that do more than just “look good on paper.” They need to have the real-world experience to match their education and certification achievements. This article features 10 questions you can ask candidates to determine if they’re the right fit.

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Mar 12016

Dwell Time: A Security Metric to Obsess Over

Jeff Schilling has an obsession with dwell time. The Armor CSO explains his infatuation with the security metric on Dark Reading. Simply, dwell time is the number of days a threat actor remains undetected within a given environment until remediation. In 2014, the reported industry average dwell time was 205 days. Thankfully, one popular incident […]