Security News

Threat Hunters Analyze Trends in Destructive Cyber-Attacks (Security Week)
2017-07-24 12:34

The three primary trends in the incidence of destructive cyber-attacks are that they are increasing; they are usually state-sponsored; and they do not, apart from a few rare occurrences, involve...

Battling Ransomware With Crowdsourced Threat Intelligence (InfoRiskToday)
2017-07-21 18:48

Ransomware Gangs' Profits Still Booming, Say AlienVault Security ResearchersIt's boom time for the ransomware business as criminals continue to make easy cryptocurrency paydays via crypto-locking...

Firms Unite to Hunt Threats From Network to Endpoint (Security Week)
2017-07-20 13:32

Network and Endpoint Threat Hunters Corvil and Endgame Combine to Provide Pan-Infrastructure Detection and Response read more

Prioritization and Automation – Using Threat Intelligence to Scale Security Operations (Security Week)
2017-07-19 14:27

In my last article I shared five steps you can take to turn threat intelligence into a threat operations program, putting yourself in a better position to reduce risk – now and in the future. read more

Five Steps to Turn Threat Intelligence into a Threat Operations Program (Security Week)
2017-07-13 12:45

Last month at the Gartner Security and Risk Management conference, I had the opportunity to speak with many CISOs, analysts and other security professionals. One of the common threads through many...

Strengthening U.S. Cybersecurity Requires Looking Beyond Nation-State Threats (Security Week)
2017-07-10 11:50

President Trump’s executive order (EO) on “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” is a commendable first step in bolstering the nation’s federal defenses...

How I learned to stop worrying (mostly) and love my threat model (ArsTechnica)
2017-07-08 13:00

Reducing privacy and security risks starts with knowing what the threats really are.

Why Kodi boxes can pose a serious malware threat (Help Net Security)
2017-07-07 13:00

When new streaming devices, such as the Amazon Firestick and Apple TV, were first introduced, many were intrigued by the ease by which they could watch “over the top” content from the Internet,...

CISO Perspective: How Tactical Cyber Threat Intelligence Fits Into Your Security Program (Security Week)
2017-07-07 12:58

In this series on the threat intelligence mind map, as we’ve drilled into different levels of intel we started with strategic cyber threat intelligence and read more

CISO Perspective: How Tactical Cyber Threat Intelligence Fits Into Your Security Program (Security Week)
2017-07-07 12:58

In this series on the threat intelligence mind map, as we’ve drilled into different levels of intel we started with strategic cyber threat intelligence and moved onto read more