Security News

Driving Security Orchestration with Your Cyber Threat Intelligence Playbook
2017-10-20 16:14

A newish buzzword in the cybersecurity world is “orchestration”. Which to me is the junction where people, process and technology all come together. It's where people build automation into process...

Threat Intelligence and the Power of Attribution
2017-09-20 20:32

Arbor's Paul Bowen on Where Organizations Miss the Mark with Threat IntelMost organizations are good at collecting threat intelligence, but they struggle to operationalize it - and especially to...

Organizations struggle to maximize the value of threat intelligence
2017-09-15 13:30

Amidst growing concerns of large-scale cyber attacks, 84 percent of organizations participating in a Ponemon Institute survey indicated threat intelligence is “essential to a strong security...

CISO Perspective: People are Critical to Your Threat Intelligence Program
2017-09-08 15:33

As technology advances continue across industry we can automate more and more tasks. read more

Emerging threats fuel public threat intelligence sharing (Help Net Security)
2017-09-07 11:45

Concerns around emerging threats such as ransomware and polymorphic malware have sparked a significant increase in collaboration by the cyber security industry, according to AlienVault. According...

Leveraging social media in advanced threat intelligence (Help Net Security)
2017-08-30 13:00

In this podcast recorded at Black Hat USA 2017, Christian Lees, CISO at InfoArmor, discusses how leveraging social media helps to understand the motives and threat landscape from threat actors....

CISO Perspective: Process is Key to Your Threat Intelligence Program (Security Week)
2017-08-18 13:22

Continuing our examination of the cyber threat intelligence mind map, we move from the different levels of threat intel (Strategic, Operational read more

STIX and TAXII: Sharing cyber threat intelligence (Help Net Security)
2017-08-14 13:00

In this podcast recorded at Black Hat USA 2017, Allan Thomson, CTO at LookingGlass Cyber Solutions, talks about STIX and TAXII. STIX (Structured Threat Information Expression) is a language for...

Hackers Compromise Accounts of FireEye Threat Intelligence Analyst (Security Week)
2017-07-31 18:46

A hacker or group of hackers claimed today to have breached FireEye's Mandiant. In a Pastebin post, they claimed, "It was fun to be inside a giant company named 'Mandiant'... 'Mandiant' knows how...