Security News
Arbor's Paul Bowen on Where Organizations Miss the Mark with Threat IntelMost organizations are good at collecting threat intelligence, but they struggle to operationalize it - and especially to...
Amidst growing concerns of large-scale cyber attacks, 84 percent of organizations participating in a Ponemon Institute survey indicated threat intelligence is “essential to a strong security...
As technology advances continue across industry we can automate more and more tasks. read more
Concerns around emerging threats such as ransomware and polymorphic malware have sparked a significant increase in collaboration by the cyber security industry, according to AlienVault. According...
In this podcast recorded at Black Hat USA 2017, Christian Lees, CISO at InfoArmor, discusses how leveraging social media helps to understand the motives and threat landscape from threat actors....
Continuing our examination of the cyber threat intelligence mind map, we move from the different levels of threat intel (Strategic, Operational read more
In this podcast recorded at Black Hat USA 2017, Allan Thomson, CTO at LookingGlass Cyber Solutions, talks about STIX and TAXII. STIX (Structured Threat Information Expression) is a language for...
A hacker or group of hackers claimed today to have breached FireEye's Mandiant. In a Pastebin post, they claimed, "It was fun to be inside a giant company named 'Mandiant'... 'Mandiant' knows how...
CISO Perspective: How Digital Risk Monitoring Fits Into Threat Intelligence Programs (Security Week)
Cyber threat intelligence means different things to different people and as such I’ve spent the last several articles exploring a threat intelligence mind map and the different levels of threat...
Ransomware Gangs' Profits Still Booming, Say AlienVault Security ResearchersIt's boom time for the ransomware business as criminals continue to make easy cryptocurrency paydays via crypto-locking...