Security News

Threat Intelligence and the Power of Attribution
2017-09-20 20:32

Arbor's Paul Bowen on Where Organizations Miss the Mark with Threat IntelMost organizations are good at collecting threat intelligence, but they struggle to operationalize it - and especially to...

Organizations struggle to maximize the value of threat intelligence
2017-09-15 13:30

Amidst growing concerns of large-scale cyber attacks, 84 percent of organizations participating in a Ponemon Institute survey indicated threat intelligence is “essential to a strong security...

CISO Perspective: People are Critical to Your Threat Intelligence Program
2017-09-08 15:33

As technology advances continue across industry we can automate more and more tasks. read more

Emerging threats fuel public threat intelligence sharing (Help Net Security)
2017-09-07 11:45

Concerns around emerging threats such as ransomware and polymorphic malware have sparked a significant increase in collaboration by the cyber security industry, according to AlienVault. According...

Leveraging social media in advanced threat intelligence (Help Net Security)
2017-08-30 13:00

In this podcast recorded at Black Hat USA 2017, Christian Lees, CISO at InfoArmor, discusses how leveraging social media helps to understand the motives and threat landscape from threat actors....

CISO Perspective: Process is Key to Your Threat Intelligence Program (Security Week)
2017-08-18 13:22

Continuing our examination of the cyber threat intelligence mind map, we move from the different levels of threat intel (Strategic, Operational read more

STIX and TAXII: Sharing cyber threat intelligence (Help Net Security)
2017-08-14 13:00

In this podcast recorded at Black Hat USA 2017, Allan Thomson, CTO at LookingGlass Cyber Solutions, talks about STIX and TAXII. STIX (Structured Threat Information Expression) is a language for...

Hackers Compromise Accounts of FireEye Threat Intelligence Analyst (Security Week)
2017-07-31 18:46

A hacker or group of hackers claimed today to have breached FireEye's Mandiant. In a Pastebin post, they claimed, "It was fun to be inside a giant company named 'Mandiant'... 'Mandiant' knows how...

CISO Perspective: How Digital Risk Monitoring Fits Into Threat Intelligence Programs (Security Week)
2017-07-28 11:41

Cyber threat intelligence means different things to different people and as such I’ve spent the last several articles exploring a threat intelligence mind map and the different levels of threat...

Battling Ransomware With Crowdsourced Threat Intelligence (InfoRiskToday)
2017-07-21 18:48

Ransomware Gangs' Profits Still Booming, Say AlienVault Security ResearchersIt's boom time for the ransomware business as criminals continue to make easy cryptocurrency paydays via crypto-locking...