Articles


A new-ish customer asked us this week about the quality of their ransomware detection coverage (based on the intel feeds they were pulling in), and how Perch handles ransomware. It was a great question, so I thought I would recap it here and share it with all of you. Intel on ransomware: Perch has a large and ever-growing amount of detections for ransomware. Here are just a few examples if you’d like to take a look.

Read More


The days of email scamming has evolved into something far more effective and profitable. One of the earlier and well-known email scams were the Nigerian Prince emails. As I’m sure you recall, these emails would offer you something along the lines of $20 million dollars in exchange for transferring funds out of Nigeria. Today’s attacks are much more sophisticated, as state sponsored and organized crime syndicates use spear phishing, invoice scams, employee payroll direct deposit changes, along with a host of others.

Read More


Vulnerability disclosures, patches, threats and new attack vectors; healthcare organizations have an ever-growing responsibility to ensure patient safety, information protection and 24x7 uptime responsibilities for critical systems. Couple that with regulatory compliance requirements, hundreds (if not thousands) of medical device manufacturers and a talent shortage in the information security industry and you have what can appear to be an insurmountable charge to ensure the organization has a comprehensive security program.

Read More

How can I help?

on March 5, 2019


“How can I help?” – seems like a simple question to ask. It wasn’t until I started watching a new medical drama last fall that I started asking this question myself. In the show, the premise of the question is supposed to invoke optimism and hope in a profession that is otherwise known for the bureaucratic red tape of the healthcare system. Fortunately, in my line of work it is not as regulated as this (even though it could be – let’s save that for another blog), but in asking this question of my colleagues, partners, and clients it has provided me a wealth of opportunity that I would otherwise not have experienced.

Read More


Cybersecurity is a quickly evolving industry and is expected to grow to USD 300 billion by 2024. With such a rapidly progressing industry you find new players emerging; one of which is Perch – Perch Security (read with James Bond voice). Although the company is new to the industry, our star-studded lineup is far from it. We have our CEO alone who has a background in founding cybersecurity companies, creating regulations and compliance (including STIX), among many other contributions to the world of cybersecurity.

Read More


What does any sane individual do when they find themselves on the losing side of a war? Look at any history book and the answer is quite evident: fight dirty. Cheap tricks, a punch 👊 below the belt – whatever it takes to claw back some advantage. And why shouldn’t a defender left with few options decide to fight nasty? Indeed, the entire world of spycraft and sabotage was born through such events.

Read More


Marketing has evolved tremendously since my days in college as an eager student. I listened intently as my professor explained things like the 4 P’s of marketing and mutually beneficial relationships, paired with acronyms like, WIFM and MRR. While these were relevant at the time, and still are in many aspects, things have changed… to say the least. Facebook is the new Yellow Pages, and SEO is the new TV commercial.

Read More


In a previous post, we described threat intelligence as “organized and analyzed information about potential threats to your organization.” It is easy to say having that information is important, but the value of threat intelligence is not decided when it is created. The value is determined when threat intelligence is put into action. To illustrate this point, let’s look at an app called Zillow. Zillow provides users with real estate data about homes they want to buy, sell, or rent.

Read More


We’re having a lot of great conversations around threat intelligence lately, so we’ve decided to address threat intelligence as part of a series with this post being part one. What is threat intelligence? Threat intelligence is defined as organized and analyzed information about potential threats to your organization.  Threat Threat intelligence is best when qualified and shared. The best security value comes from sharing information regarding the sighting of IOCs.

Read More


Are you worried about those pesky hackers getting into your network and owning your devices? Have you ever wanted enterprise-grade detection capabilities on your small residential or commercial network? Do you search the internet regularly looking for the latest TTPs the bad guys are using (like the ones outlined in our weekly threat reports) and wish you could use that info to hunt for threats in your network? The good news is, you can!

Read More