New Threat Research: Uncovering Adversarial LDAP Tradecraft

Read Threat Research

Search

Resources

Discover cybersecurity education and training from our industry experts.

buyers guide 1

Binary Defense Buyer’s Guide

This Cybersecurity Buyer’s Guide will help you gain a deeper understanding of today’s threat landscape, along with insight into the top cybersecurity solutions offered by Binary Defense including SOC-as-a-Service, MDR, SIEM, Threat Hunting and Counterintelligence.

Stay Connected

Binary Defense Blog

Read the latest news and insights from our industry experts.

Incident Response – IR Planning & MDR Coordination  

Incident Response (IR) shapes how effectively an organization can survive and recover from a cyberattack.  

Read More

The Role of Deception Technology in Modern Cybersecurity

Read More

Demystifying Open XDR: What It Is, How to Do It, and ROI

Read More

Case Studies

See how we protect businesses just like yours.

Threat Hunter finds renamed system utilities by file hash to uncover multiple attacks   

Summary:  Threat hunting is a vital but often misunderstood practice for organizations and security teams. Curiosity is one of the driving forces behind any…

Read More

Town of North Haven leverages human expertise and MDR technology to keep its services running smoothly for its citizens 

Read More

Insurance company keeps customer data safe from threat actors with help from Binary Defense SIEM management

Read More

Data Sheets & Infographics

Discover the features and benefits of our cybersecurity solutions.

Phishing Response

 The Binary Defense Phishing Response service combines Threat Intelligence, Technology, and Analyst Tradecraft to reduce the risk of malicious emails reaching your employees mailboxes. 

Read More

Incident Response

Read More

Shield Partner Program

Read More

Threat Watch

Stay informed of cybersecurity news and events.

Nokoyawa Ransomware Attacks Leveraging Windows Zero Day

A report recently released by Kaspersky Labs has detailed a threat actor making use of a CLFS (Common Log File System) exploit to escalate…

Read More

Two Critical-Severity Vulnerabilities Patched in Latest Security Updates from SAP

Read More

Deluge of Fake Packages Cause DoS Attack on npm

Read More

Videos

Browse our video library to learn more about Binary Defense.

Binary Defense SIEM Services

We shield your business from cyberattacks with SIEM deployment, tuning and monitoring services that are customizable to your needs.

Read More

NCR Protects Global Network with SIEM Monitoring and Threat Hunting

Read More

Binary Defense Managed Detection & Response

Read More

White Papers

Dive deep into cybersecurity trends and tactics.

Binary Defense Key Economic Impact Report

Learn the value of Binary Defense managed security services to your organization with this Key Economic Impact Report. Binary Defense contracted with unbiased third-party…

Read More

Security Use Cases for Your SIEM

Read More

MDR – Advanced Threat Protection Beyond Antivirus

Read More

Webinars

Learn about the latest cybersecurity trends from industry experts.

Deconstructing the Detection Query Conundrum

About the Webinar: Join Jonny Johnson and Andrew Schwartz on Tuesday, December 19 at 1 PM ET for an engaging roundtable discussion on the…

Read More

Evasive Threat Landscape: Gain insights into the evolving tactics

Read More

The Value of Threat Research

Read More