Security News

CISO Perspective: How Operational Cyber Threat Intelligence Fits Into Security Programs (Security Week)
2017-06-16 15:58

So far on our journey through the threat intelligence mind map, we’ve gone through an overview of the many intel levels and components and we’ve drilled down into strategic cyber threat intell read more

CISO Perspective: How Operational Cyber Threat Intelligence Fits Into Your Security Program (Security Week)
2017-06-16 15:58

So far on our journey through the threat intelligence mind map, we’ve gone through an overview of the many intel levels and components and we’ve drilled down into strategic cyber threat...

Whitepaper: Confronting advanced threats as an organization (Help Net Security)
2017-06-15 20:54

Global cybersecurity issues have gone mainstream, but email security has curiously slipped by the wayside despite the fact that 91% of today’s targeted attacks start with email. What’s more, while...

Threat Hunting Sqrrl Raises $12.3 Million for Global Expansion (Security Week)
2017-06-15 13:58

Cambridge, Mass-based Sqrrl -- one of the new breed of threat hunters -- has raised $12.3 million in Series C funding. This follows $7 million Series B funding in February 2015, and raises the...

Improve Incident Response with SOPs for Cyber Threat Intelligence (Security Week)
2017-06-13 02:36

When it comes to improving cyber incident response, security teams can learn a valuable lesson from the military about the importance of standard operating procedures. “SOPs” document prescribed...

Email-borne threats: Watch your inbox closely on Thursdays (Help Net Security)
2017-06-08 20:27

Malicious email attachment message volume spikes more than 38% on Thursdays over the average weekday volume. Ransomware attackers in particular favor sending malicious messages Tuesday through...

Using History to Overcome the Challenge of Threat Intelligence Data Overload (Security Week)
2017-06-08 13:27

Applying Unfiltered Threat Intelligence to Defenses Generates Significant False Positives read more

Threat Modeling the Internet of Things Part 2: Three Steps to Pizza (Security Week)
2017-06-07 17:16

Part 1 of this series posited that the Internet of Things (IoT) needs a more rigorous security application than it currently has, lest we end up building another patchy, vulnerability-ridden...

Dark web fraud guides reveal potential threats to orgs (Help Net Security)
2017-06-07 15:02

An in-depth look at content from more than 1,000 fraud guides available for sale on the dark web revealed that the majority of these guides are useless. Still, as many as 20 percent have the...

Whitepaper: Confronting advanced threats as an organization (Help Net Security)
2017-06-06 22:00

Global cybersecurity issues have gone mainstream, but email security has curiously slipped by the wayside despite the fact that 91% of today’s targeted attacks start with email. What’s more, while...