Unefen Blog
Thoughts and thought leadership from the team at Unefen
Unefen Blog
Thoughts and Thought Leadership from the Team at Unefen
All I Needed to Know About Machine Learning I Learned at the Wood Mill
The Value of Machine Learning How would you make Machine Learning valuable? Since Machine Learning is the competitive assembly of algorithms that...
Security Leaders: Get Off the Treadmill of Panic
Setting Yourself Up for Success New threats and vulnerabilities are surfacing every day, and if they’re as significant as Log4j it can cause massive...
Lies, Damn Lies, and Artificial Intelligence
The Formula Isn't Wrong "Put a bird on it." Like an episode of Portlandia that never ends, tech companies think you want them to "put AI/ML...
Why Asset Visibility is Very Important to IT Department
Why Asset Visibility is Very Important to IT Department There is an agreement on the security side that asset visibility is of utmost importance....
Identifying and Remediating the Log4j2 Zero-Day Vulnerability
Log4j Vulnerability - December 2021 Updates In December 2021, a serious vulnerability was identified (CVE-2021-44228) that affects Log4j2...
What is Artificial Intelligence
Machine Learning and Artificial Intelligence Walk Into a Bar... There are a lot of misconceptions about what AI really is and how it can be...
Log4J2 2.15.0: How can I verify that the Unefen appliance has been updated to mitigate the Log4j2 CVE-2021-44228 vulnerability?
Log4j Unefen Appliance Update A zero-day exploit for a vulnerability (CVE-2021-44228) in the widely-used Apache Log4j framework was publicly...
The Importance of Asset Visibility
Why IT Departments Need Asset Visibility Security teams recognize the importance of asset visibility. One of the main concerns that CISOs have...
The Zero Trust Trap
Falling Into the Trap Like a hologram, Zero Trust’s benefits differ based on the observer’s perspective. Sales teams will tout work from anywhere...
How Unefen Saves Cost in AWS
Reducing Amazon Web Services CostsEffectively monitoring and detecting resources in AWS can be a challenge to any enterprise. AWS provides a...
Discover and Identify Risks in Your OT/ICS Environments
Protect Your Environment from Unknowns Industrial and critical infrastructure (OT/ICS) organizations know that threats from adversaries are...
Log4J2 2.16.0: How can I verify that the Unefen has been updated to mitigate the Log4j2 CVE-2021-45046 vulnerability?
The widely used Apache Log4j2 framework was recently revealed to have an exploitable vulnerability (CVE-2021-44228). Earlier today, a second...
The Beginning of Unefen
Four years ago, Ronald Banza and I met at a restaurant on the coast in California. We had known each other since 2012. We had built internal products together. Over lunch, we decided to build a company together. The question then was what will that company do?
Han Shot First
CICOs and Cinnamon Rolls “What are you doing?” I’ve been asked that question in its various forms over the past few months. First, let me...
Matryoshka, CISO
Strategy struggling CISO? Commiserate with Sisyphus How do I start? Ask Prometheus Do you finish every book you begin? I learned how to read a book,...
Bloom, CISO
“You’ve met plenty of people and heard a great deal about us, what do you think you’d like your first 90 days to be like?”...And she had. She’d been...
Prometheus, CISO
Descriptions Are Not Strategies The sun rises and the sun sets; panting, it returns to its place where it rises. Gusting to the south, turning to...
Sisyphus, CISO
“Absolute futility,” says the Teacher. “Absolute futility. Everything is futile.” What does a man gain for all his efforts that he labors at under the sun? A generation goes and a generation comes, but the earth remains forever.