Security News

CISO Perspective: How Digital Risk Monitoring Fits Into Threat Intelligence Programs (Security Week)
2017-07-28 11:41

Cyber threat intelligence means different things to different people and as such I’ve spent the last several articles exploring a threat intelligence mind map and the different levels of threat...

Secrets of successful threat hunters and SOCs (Help Net Security)
2017-07-26 13:27

McAfee has polled over 700 IT and security professionals from a diverse set of countries, industries, and organization sizes about the role of threat hunting and the evolution of the security...

Expected cyber threats over the next six months (Help Net Security)
2017-07-26 12:45

With recent large-scale cyber attacks signaling a growing front in destructive threats and business impact, a new midyear report from iDefense, part of Accenture Security, reveals how threat...

Tech Firms Target Domains Used by Russia-linked Threat Group (Security Week)
2017-07-25 11:45

Tech companies ThreatConnect and Microsoft are moving toward exposing and taking down domains associated with Russia-linked threat group known as Fancy Bear. read more

ICS Networks Not Immune To Insider Threats (Security Week)
2017-07-25 11:06

Organizations Need Specialized Monitoring and Control Technologies for ICS Networks  read more

Threat Hunters Analyze Trends in Destructive Cyber-Attacks (Security Week)
2017-07-24 12:34

The three primary trends in the incidence of destructive cyber-attacks are that they are increasing; they are usually state-sponsored; and they do not, apart from a few rare occurrences, involve...

Battling Ransomware With Crowdsourced Threat Intelligence (InfoRiskToday)
2017-07-21 18:48

Ransomware Gangs' Profits Still Booming, Say AlienVault Security ResearchersIt's boom time for the ransomware business as criminals continue to make easy cryptocurrency paydays via crypto-locking...

Firms Unite to Hunt Threats From Network to Endpoint (Security Week)
2017-07-20 13:32

Network and Endpoint Threat Hunters Corvil and Endgame Combine to Provide Pan-Infrastructure Detection and Response read more

Prioritization and Automation – Using Threat Intelligence to Scale Security Operations (Security Week)
2017-07-19 14:27

In my last article I shared five steps you can take to turn threat intelligence into a threat operations program, putting yourself in a better position to reduce risk – now and in the future. read more

Five Steps to Turn Threat Intelligence into a Threat Operations Program (Security Week)
2017-07-13 12:45

Last month at the Gartner Security and Risk Management conference, I had the opportunity to speak with many CISOs, analysts and other security professionals. One of the common threads through many...