Security News

CISO Perspective: How Digital Risk Monitoring Fits Into Threat Intelligence Programs (Security Week)
2017-07-28 11:41

Cyber threat intelligence means different things to different people and as such I’ve spent the last several articles exploring a threat intelligence mind map and the different levels of threat...

Battling Ransomware With Crowdsourced Threat Intelligence (InfoRiskToday)
2017-07-21 18:48

Ransomware Gangs' Profits Still Booming, Say AlienVault Security ResearchersIt's boom time for the ransomware business as criminals continue to make easy cryptocurrency paydays via crypto-locking...

Prioritization and Automation – Using Threat Intelligence to Scale Security Operations (Security Week)
2017-07-19 14:27

In my last article I shared five steps you can take to turn threat intelligence into a threat operations program, putting yourself in a better position to reduce risk – now and in the future. read more

Five Steps to Turn Threat Intelligence into a Threat Operations Program (Security Week)
2017-07-13 12:45

Last month at the Gartner Security and Risk Management conference, I had the opportunity to speak with many CISOs, analysts and other security professionals. One of the common threads through many...

CISO Perspective: How Tactical Cyber Threat Intelligence Fits Into Your Security Program (Security Week)
2017-07-07 12:58

In this series on the threat intelligence mind map, as we’ve drilled into different levels of intel we started with strategic cyber threat intelligence and read more

CISO Perspective: How Tactical Cyber Threat Intelligence Fits Into Your Security Program (Security Week)
2017-07-07 12:58

In this series on the threat intelligence mind map, as we’ve drilled into different levels of intel we started with strategic cyber threat intelligence and moved onto read more

InfoArmor: Operatively-sourced threat intelligence (Help Net Security)
2017-06-20 12:30

In this podcast, Mike Kirschner, Senior Vice President of Advanced Threat Intelligence at InfoArmor, talks about this dark web operatively sourced intelligence firm that is really focused on dark...

CISO Perspective: How Operational Cyber Threat Intelligence Fits Into Security Programs (Security Week)
2017-06-16 15:58

So far on our journey through the threat intelligence mind map, we’ve gone through an overview of the many intel levels and components and we’ve drilled down into strategic cyber threat intell read more

CISO Perspective: How Operational Cyber Threat Intelligence Fits Into Your Security Program (Security Week)
2017-06-16 15:58

So far on our journey through the threat intelligence mind map, we’ve gone through an overview of the many intel levels and components and we’ve drilled down into strategic cyber threat...

Improve Incident Response with SOPs for Cyber Threat Intelligence (Security Week)
2017-06-13 02:36

When it comes to improving cyber incident response, security teams can learn a valuable lesson from the military about the importance of standard operating procedures. “SOPs” document prescribed...