Stay up to date with IronNet’s executive commentary, threat research, and strategic analysis from the company’s blog at https://www.ironnet.com/blog.
Command and control (C2) infrastructures are the “brain” behind successful, malicious cyber-attacks, including malware, ransomware, ransomware-as-a-service, living-off-the-land attacks, etc. As dangerous cyber weapons, C2 infrastructures are used by cyber criminals to communicate nefarious commands to systems inside a compromised network. Learn more…
This ability to analyze and correlate seemingly unrelated instances is critical for identifying sophisticated attackers who leverage varying infrastructures to hide their activity from existing cyber defenses. As reported in the September Threat Intelligence Brief, our analysts review alerts from millions of data flows that are ingested and processed with big data analytics. Learn more…
As we learned from the pandemic, it’s important to keep your distance from others when sick. When it comes to the security of your organization’s networks and assets, it’s similarly important to keep personal accounts and devices at a distance from corporate systems for network health. Learn more…
There’s no secret that I have an affinity for cars. Some may say that I need an intervention. If you were to ask me what my favorite car is, I would be hard pressed to nail down an answer. But what I do know is this: my blue Porsche 911 is a thing of beauty. Not to mention doing 0 to 60 mph in 4 seconds. Learn more…