Security News

Free eBook: Threat intelligence platforms
2019-10-10 03:45

Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus programs, and traditional...

Report: 2019 eSentire Threat Intelligence Spotlight
2019-10-08 03:30

This new report, Threat Intelligence Spotlight: The Shifting Framework of Modern Malware, draws on data gathered from the 650-plus organizations that eSentire protects and Carbon Black’s extensive...

Use Case-Centric Threat Intelligence Requires a Considered Approach
2019-09-23 13:48

One of the most promising developments I’ve seen in threat intelligence over the last year or so is a greater emphasis on use cases. read more

Targeted threat intelligence and what your organization might be missing
2019-09-17 04:00

In this Help Net Security podcast recorded at Black Hat USA 2019, Adam Darrah (Director of Intelligence), Mike Kirschner (Chief Operating Officer) and Christian Lees (Chief Technology Officer)...

Whitepaper: Security Orchestration with Threat Intelligence
2019-09-03 03:00

Understand how you can make smarter decisions to move faster — both blocking an adversary and disrupting them altogether — by using orchestration with intelligence. The post Whitepaper: Security...

eBook – Threat intelligence platforms: Everything you’ve ever wanted to know
2019-08-15 12:20

Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus programs, and traditional...

Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial
2019-08-05 03:45

As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like Malware Information Sharing...

Bandura Cyber improves performance and functionality of its Threat Intelligence Gateway
2019-08-02 01:30

Bandura Cyber, the leading provider of automated and actionable, turnkey threat intelligence-driven network security, announced the next generation of its market leading Bandura Cyber Threat...

While cybercriminals abuse Twitter, threat researchers use it to boost threat intelligence efforts
2019-07-30 12:00

Cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration, according to Trend Micro. Misuse of social networks Researchers analyzed a...

Whitepaper: Building a Threat Intelligence Programme (UK)
2019-07-30 10:49

ThreatConnect surveyed more than 350 cybersecurity decision makers in the UK. The result: Building a Threat Intelligence Programme discusses research findings on best practices and impact of those...