Security News
So far on our journey through the threat intelligence mind map, we’ve gone through an overview of the many intel levels and components and we’ve drilled down into strategic cyber threat intell read more
So far on our journey through the threat intelligence mind map, we’ve gone through an overview of the many intel levels and components and we’ve drilled down into strategic cyber threat...
Global cybersecurity issues have gone mainstream, but email security has curiously slipped by the wayside despite the fact that 91% of today’s targeted attacks start with email. What’s more, while...
Cambridge, Mass-based Sqrrl -- one of the new breed of threat hunters -- has raised $12.3 million in Series C funding. This follows $7 million Series B funding in February 2015, and raises the...
When it comes to improving cyber incident response, security teams can learn a valuable lesson from the military about the importance of standard operating procedures. “SOPs” document prescribed...
Malicious email attachment message volume spikes more than 38% on Thursdays over the average weekday volume. Ransomware attackers in particular favor sending malicious messages Tuesday through...
Applying Unfiltered Threat Intelligence to Defenses Generates Significant False Positives read more
Part 1 of this series posited that the Internet of Things (IoT) needs a more rigorous security application than it currently has, lest we end up building another patchy, vulnerability-ridden...
An in-depth look at content from more than 1,000 fraud guides available for sale on the dark web revealed that the majority of these guides are useless. Still, as many as 20 percent have the...
Global cybersecurity issues have gone mainstream, but email security has curiously slipped by the wayside despite the fact that 91% of today’s targeted attacks start with email. What’s more, while...