Security News

Threat intelligence provider Recorded Future today announced that it has raised $25 million in a Series E round of funding Led by Insight Venture Partners. read more

A newish buzzword in the cybersecurity world is “orchestration”. Which to me is the junction where people, process and technology all come together. It's where people build automation into process...

read more

Arbor's Paul Bowen on Where Organizations Miss the Mark with Threat IntelMost organizations are good at collecting threat intelligence, but they struggle to operationalize it - and especially to...

Amidst growing concerns of large-scale cyber attacks, 84 percent of organizations participating in a Ponemon Institute survey indicated threat intelligence is “essential to a strong security...

As technology advances continue across industry we can automate more and more tasks. read more

Concerns around emerging threats such as ransomware and polymorphic malware have sparked a significant increase in collaboration by the cyber security industry, according to AlienVault. According...

In this podcast recorded at Black Hat USA 2017, Christian Lees, CISO at InfoArmor, discusses how leveraging social media helps to understand the motives and threat landscape from threat actors....

Continuing our examination of the cyber threat intelligence mind map, we move from the different levels of threat intel (Strategic, Operational read more

In this podcast recorded at Black Hat USA 2017, Allan Thomson, CTO at LookingGlass Cyber Solutions, talks about STIX and TAXII. STIX (Structured Threat Information Expression) is a language for...