Security News
![Whitepaper: Building a Threat Intelligence Programme](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
ThreatConnect surveyed more than 350 UK information security decision makers. Building a Threat Intelligence Programme discusses research findings on best practices and impact of those programmes....
![Threat Intelligence Firm Flashpoint Raises $34 Million](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Threat intelligence company Flashpoint this week announced that it received a total of $34 million in investment and debt financing. Of the total amount, $6 million represents new equity from...
![Free eBook: Threat intelligence platforms](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus programs, and traditional...
![Report: 2019 eSentire Threat Intelligence Spotlight](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
This new report, Threat Intelligence Spotlight: The Shifting Framework of Modern Malware, draws on data gathered from the 650-plus organizations that eSentire protects and Carbon Black’s extensive...
![Use Case-Centric Threat Intelligence Requires a Considered Approach](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
One of the most promising developments I’ve seen in threat intelligence over the last year or so is a greater emphasis on use cases. read more
![Targeted threat intelligence and what your organization might be missing](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
In this Help Net Security podcast recorded at Black Hat USA 2019, Adam Darrah (Director of Intelligence), Mike Kirschner (Chief Operating Officer) and Christian Lees (Chief Technology Officer)...
![Whitepaper: Security Orchestration with Threat Intelligence](/static/build/img/news/alt/hackers-statistics-small.jpg)
Understand how you can make smarter decisions to move faster — both blocking an adversary and disrupting them altogether — by using orchestration with intelligence. The post Whitepaper: Security...
![eBook – Threat intelligence platforms: Everything you’ve ever wanted to know](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus programs, and traditional...
![Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial](/static/build/img/news/alt/web-statistics-2-small.jpg)
As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like Malware Information Sharing...
![Bandura Cyber improves performance and functionality of its Threat Intelligence Gateway](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Bandura Cyber, the leading provider of automated and actionable, turnkey threat intelligence-driven network security, announced the next generation of its market leading Bandura Cyber Threat...