Security News

Driving Security Orchestration with Your Cyber Threat Intelligence Playbook
2017-10-20 16:14

A newish buzzword in the cybersecurity world is “orchestration”. Which to me is the junction where people, process and technology all come together. It's where people build automation into process...

Fighting the Insider Threat: A Long-Term Battle
2017-10-18 18:48

To be successful, the quest to mitigate insider threat risks must start at the time employees are hired and continue as they move into different positions requiring varying degrees of data access,...

Using a robust platform for cyber threat analysis training
2017-10-16 15:25

We have recognised threats coming more regularly from varied origins such as nation-states, hacktivist and cybercriminal actors. Coupled with many new public policies aimed at mitigating the...

The Goldilocks Effect of Cyber Threat Data
2017-10-12 12:03

In the world of big data there’s something I refer to as “the Goldilocks effect” and it’s particularly problematic when it comes to cyber threat data. Too much data and you’re looking for a needle...

Trump Issues Threat Sharing Directive to Intelligence Community
2017-10-11 13:21

President Trump issued a memorandum on Oct. 5 requiring the intelligence community to establish an inter-agency information sharing network. Agency heads are required to submit a plan within 270...

Outsmarting grid security threats
2017-10-05 13:00

Almost two-thirds (63 percent) of utility executives believe their country faces at least a moderate risk of electricity supply interruption from a cyberattack on electric distribution grids in...

Threat Modeling the Internet of Things: Part 4 - Weak Authentication
2017-10-04 12:20

For the first time, one of the largest cyber security conferences in the ASEAN region, the Singapore Internet CyberSecurity Week (SICW), had a track devoted just to the Internet of Things. One...

The Challenge of Training AI to Detect Unique Threats
2017-10-03 12:22

In a previous column, I discussed how traditional endpoint security fails because it focuses on detecting known bad instances. As evidenced by the rapid rise of email-based attacks, this is a...

Third-Party Risks a Rising Cyber Threat, Research Shows
2017-09-28 12:28

Third-party risk and understanding that risk continues to grow; but mitigation of the risk is, if anything, getting worse. This can be seen in two separate studies published this week by Ponemon...