<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Lenny Zeltser

Lenny is a seasoned business and tech leader with extensive experience in information security. Prior to joining Minerva, Lenny served as a Director of Product Management at a Fortune 500 company with a focus on security software and services.
Find me on:

Recent Posts

Deconstructing Fileless Attacks into 4 Underlying Techniques

How can we turn discussions about the vague notion of fileless attacks into constructive, specific conversations?

Read More >>
 

How Fileless Malware Infections Start

The notion of fileless attacks describes incidents where adversaries avoid writing malicious code to disk, aiming to operate solely in memory and abuse features of applications and the OS.

Read More >>
 

Minerva’s Anti-Evasion Platform as Part of the McAfee Ecosystem

What drives two endpoint security vendors to work together? The recognition that customers will benefit from the unique advantages of each company’s technologies.

Read More >>
 

How Minerva’s Anti-Evasion Platform Fits into Your Incident Response Process

Investigating a suspicious security event on the endpoint and responding to a possible infection can be stressful and time-consuming. Was it a false alarm? Did the threat succeed at penetrating

Read More >>
 

Untangling the “Windows Defender” Naming Mess

Microsoft includes “Windows Defender” in names of several security capabilities that the company provides. In discussions with Minerva Labs customers and partners I’ve witnessed frequent confusion

Read More >>
 

Containing and Recovering from Incidents with the Help of Minerva Labs and Carbon Black

Despite their efforts to prevent intrusions, enterprises can find themselves dealing with large-scale compromises. When the investigation reveals that numerous endpoints in the organizations are

Read More >>
 

What is an exploit kit?

In our 2017 End of Year Research Report, we found that 86% of exploit kits employed evasive tactics to avoid detection. Here’s all you need to know about exploit kits and how to address the threat.

Read More >>
 

Protecting Critical Assets on the Endpoint When Malware Prevention Might Not Work

How can you protect your critical assets and applications in a practical manner that is suited to real world deployments?

Read More >>
 

Considerations for Augmenting Antivirus Protection on the Endpoint

When deciding how to augment your baseline AV protection on the endpoint, understand the benefits and operational characteristics of each approach you’re considering. Here are a few guidelines.

Read More >>
 

Reflections Upon Deception-Based Security Tactics

I’ve been pondering the use of deception and variability to defend IT assets. Honeypots have been discussed in this context for quite a while, yet their initial implementation failed to take off

Read More >>
 
1 2

Subscribe to Our Blog

Topics

see all