Security News

Accenture announced Howard Marshall has joined the company as the new intelligence director for its cyber threat intelligence services. A cybersecurity expert and strategist, Marshall has served...

ThreatConnect announces new Playbooks enablements to optimize the ability to make faster security decisions, automate processes, and improve reaction and response capacity. “Our vision is a...

Anti-Phishing Working Group Confident It Will Navigate GDPR RequirementsEurope's General Data Protection Regulation is reshaping the way organizations handle data. That's going to have an impact...

Organizations today have access to countless sources of threat intelligence. And yet many still struggle to operationalize this intel effectively. Russ Spitler of AlienVault discusses how to...

Goldman Sachs Becomes a Strategic Investor in LookingGlass Cyber Solutions read more

In this podcast recorded at RSA Conference 2018, Jimmy Graham, Director of Product Management, Vulnerability Management at Qualys, talks about the importance of threat intelligence and...

The Domain Name System (DNS) turns a user-friendly domain name into an IP address that computers use to identify each other. DNS is unencrypted by default. Most security vendors still heavily rely...

The Industry Needs a Common Understanding of How to Best Put Threat Intelligence Into Practice “Knowledge is of no value unless you put it into practice.” When Russian author Anton Chekhov said...

The April 2018 SAP Security Notes consists of 16 patches with the majority of them rated medium.

Processing and parsing intelligence from all sources - external and internal, structured and abstract - across three important categories is essential to a proactive, predictive threat...