Carbon Black, Inc.
Follow Carbon Black, Inc. on their other social channels!
About Us
Company Size:
501-1000 employees
Company Type:
Waltham, MA
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely ...
Read more
Promoted Content
7 Experts on Moving to a Cloud-Based Endpoint Security Platform
Parity Pledge: Carbon Black’s Continued Commitment to Diversity & Inclusion
Carbon Black knows that unique ideas come from unique perspectives, which is why we’ve focused on creating a more diverse and inclusive workplace. Our team has built out initiatives to support our current workforce and continues to seek out new opportunities to attract and hire diverse members to the organization. To show our dedication to this initiative, specifically related to hiring more women, we recently signed the Parity Pledge. About the Parity Pledge’s focus ...
10 Endpoint Security Problems Solved by the Cloud – Managing Infrastructure
This week marks our final post in this series.  Today we’re going to step away from last week’s topic, getting the help you need, and examine how the cloud eliminates the need to manage infrastructure.   On-Prem is Complex and Costly On-premise solutions require a massive amount of resources and funds to maintain, and ensuring those systems remain current when updates are available is a challenge.  Costly capital expenditures for servers, storage, and networks are req ...
Partner Perspectives: Detect All Devices, Respond to All Threats
Michael Tanji is the Chief Operations Officer for Senrio. The ability to detect and respond to cyber threats in a timely manner is an essential capability of every security-minded enterprise. Endpoint detection and response (EDR) solutions, such as Carbon Black’s Cb Response, are a critical component of such capabilities, but the effectiveness of an EDR solution is diminished if it is not applied to all endpoints. The introduction of bring your own device (BYOD) and rogue IT into the workp ...
10 Endpoint Security Problems Solved by the Cloud – Getting The Help You Need
Last week we looked at how the cloud helps you respond quickly to threats.  This week, we’re going to examine why the cloud outperforms traditional AV when it comes to getting the help you need.   It’s You vs. Them Once upon a time, viruses were produced by individual hackers who were more interested in proving they could get through defenses than do actual damage.  But now, everything is different. Today there are reportedly over one million paid cybercriminals who wo ...
What Can Application Control Do For You?
In past blogs, we’ve taken a look at application control and the best practices for successful deployment.  Today we’re going to shift gears slightly, and highlight the reasons some companies have chosen this practice. Whitelist With Flexibility  It seems counterintuitive to put “whitelisting” and “flexibility” together–but that’s just what some internet giants have done.  They keep their machines in a fully locked down, high-enforc ...
Partner Perspectives: Security Orchestration as a Catalyst for Proactive Incident Response
Meny Har is the VP of Product for Siemplify. Benjamin Franklin famously advised the fire-threatened residents of Philadelphia, “An ounce of prevention is worth a pound of cure.” And while being proactive may have been effective for fire prevention, the approach does not translate into the impending threats of today’s world of cybersecurity. As any infosec pro knows, preventing every security event is impossible, so a strong incident response plan is paramount. In its recent Qua ...
Partner Perspectives: Attivo + Carbon Black Integration Delivers Advanced, Continuous Threat Managem
Joseph Salazar is the Technical Deception Officer for Attivo Networks. Cyber attackers have repeatedly proven that they can gain access to the networks of even the most security-savvy organizations. Whether the attacker finds their way in through the use of stolen credentials, zero-day exploitation, a ransomware attack or starting as an insider, they will establish a foothold and move laterally throughout the network until they complete their mission. Once attackers bypass existing security prev ...
Carbon Black Announces Cb LiveOps, a New Offering on the Cb Predictive Security Cloud (PSC), Deliver
Today is another exciting day for Carbon Black! Earlier, we announced the release of Cb LiveOps™– the newest offering built on our Cb Predictive Security Cloud™ (PSC). a platform delivering complete endpoint prevention, detection, and response, all from a single agent. Cb LiveOps extends core functionality of osquery to empower organizations to ask questions of all endpoints, take action to remediate identified issues in real time, and simplify operational reporting.  ...
10 Endpoint Security Problems Solved by the Cloud – Responding Quickly To Threats
In this week’s installment of 10 endpoint security problems solved by the cloud, we’re going to step away from last week’s topic, identifying problems, and examine how the cloud helps organizations respond quickly to threats.   Speed is Critical Attackers move quickly, and your ability to respond just as quickly is critical to the protection of your systems.  When you have to go back and hunt for when and where an attack began, you lose valuable time that could be th ...
Case Study: A Cryptomining Attack — With an Assist From Advanced Malware Techniques
In Carbon Black’s Quarterly Incident Response Threat Report (QIRTR), some of the world’s leading incident response (IR) professionals reported seeing an uptick in lateral movement, counter incident response, and island-hopping attacks from motivated nation-states. In the case study below, Kroll notes how it uses Cb Response to remediate a cryptomining attack. One day in early summer, a healthcare company noticed something troubling: An abnormally high volume of network traffic was ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?