Security News

Prioritization and Automation – Using Threat Intelligence to Scale Security Operations (Security Week)
2017-07-19 14:27

In my last article I shared five steps you can take to turn threat intelligence into a threat operations program, putting yourself in a better position to reduce risk – now and in the future. read more

Five Steps to Turn Threat Intelligence into a Threat Operations Program (Security Week)
2017-07-13 12:45

Last month at the Gartner Security and Risk Management conference, I had the opportunity to speak with many CISOs, analysts and other security professionals. One of the common threads through many...

CISO Perspective: How Tactical Cyber Threat Intelligence Fits Into Your Security Program (Security Week)
2017-07-07 12:58

In this series on the threat intelligence mind map, as we’ve drilled into different levels of intel we started with strategic cyber threat intelligence and read more

CISO Perspective: How Tactical Cyber Threat Intelligence Fits Into Your Security Program (Security Week)
2017-07-07 12:58

In this series on the threat intelligence mind map, as we’ve drilled into different levels of intel we started with strategic cyber threat intelligence and moved onto read more

InfoArmor: Operatively-sourced threat intelligence (Help Net Security)
2017-06-20 12:30

In this podcast, Mike Kirschner, Senior Vice President of Advanced Threat Intelligence at InfoArmor, talks about this dark web operatively sourced intelligence firm that is really focused on dark...

CISO Perspective: How Operational Cyber Threat Intelligence Fits Into Security Programs (Security Week)
2017-06-16 15:58

So far on our journey through the threat intelligence mind map, we’ve gone through an overview of the many intel levels and components and we’ve drilled down into strategic cyber threat intell read more

CISO Perspective: How Operational Cyber Threat Intelligence Fits Into Your Security Program (Security Week)
2017-06-16 15:58

So far on our journey through the threat intelligence mind map, we’ve gone through an overview of the many intel levels and components and we’ve drilled down into strategic cyber threat...

Improve Incident Response with SOPs for Cyber Threat Intelligence (Security Week)
2017-06-13 02:36

When it comes to improving cyber incident response, security teams can learn a valuable lesson from the military about the importance of standard operating procedures. “SOPs” document prescribed...

Using History to Overcome the Challenge of Threat Intelligence Data Overload (Security Week)
2017-06-08 13:27

Applying Unfiltered Threat Intelligence to Defenses Generates Significant False Positives read more

Ohio Companies Unite to Share Threat Intelligence (Security Week)
2017-05-31 19:37

Cybersecurity is a form of asymmetric warfare. The attackers need to only succeed once; the defenders must succeed constantly. The attackers share weapons and methods continuously; the defenders...