Security News

How to build a cyber threat intelligence program while cutting through the noise
2020-07-09 16:00

The advantages of having decent threat intelligence in place are many and various, as the threat landscape continues to widen year-on-year. The problem, as with any complex big-data project, is cutting through the inevitable data deluge to correctly identify the bits you need - the people, places, technology, and other moving parts to build the picture.

How to establish a threat intelligence program
2020-06-24 05:30

"You may collect information on an ongoing or future threat to your organization to include who the threat actor is, what are they going after, what is the tactic they will utilize to get in your network, how are they going to move laterally, how are they going to exfil information and when will the activity take place. You can collect all the relevant threat information but without the infrastructure in place to analyze the large amount of data coming in, the organization will not succeed in successfully orienting themselves and acting upon the threat information," Santiago Holley, Global Threat Intelligence Lead at Thermo Fisher Scientific, told Help Net Security. Holley has worked in multiple threat intelligence and cyber positions over the past ten years, including a stint as a Threat Intelligence Lead with the FBI, and this allows him to offer some advice to security leaders that have been tasked with setting up a robust threat intelligence program for their organization.

By Light and FireEye incorporate threat intelligence into cyberspace attacks
2020-06-04 01:30

By Light Professional IT Services and the intelligence-led security company, FireEye announced the integration of Mandiant Threat Intelligence within By Light's Cyberoperations Enhanced Network and Training Simulators. As today's cyberspace landscape features an increasing number of well-funded, highly organized, and complex adversaries, the use of real-world threat intelligence in training and exercises has become crucial to defending effectively against cyberspace attacks.

Microsoft Open-Sources COVID-19 Threat Intelligence
2020-05-15 16:36

Microsoft this week announced that it has made some of its COVID-19 threat intelligence available to the public. The number of attacks targeting organizations and individuals worldwide using coronavirus lures has increased dramatically over the past several months, and Microsoft says it wants to help even those who do not use its threat protection solutions.

Recorded Future Releases Free Threat Intelligence Browser Extension
2020-05-07 14:28

Recorded Future this week announced the availability of Express, a free web browser extension designed to help security teams prioritize vulnerability patching and alerts from security information and event management tools. The extension is currently available for Chrome and Firefox, and once it's installed an icon with the Recorded Future logo will be added to the browser's toolbar.

King & Union augments its Avalon Cyber Analysis Platform with threat intelligence services
2020-05-07 00:30

King & Union launched a suite of new service offerings to augment its Avalon Cyber Analysis Platform and help customers address the human aspect of threat intelligence operations, bridging common gaps that many security teams face. "With the introduction of new services, King & Union is recognizing the critical human component of efficient threat intelligence operations. Threat intelligence analysts are hard to find and even harder to keep."

Sixgill’s new Darkfeed automated threat intelligence now available in the Anomali APP Store
2020-04-28 23:45

Sixgill, a leading cyber threat intelligence company, announced that as part of its partnership with Anomali, its new Darkfeed automated threat intelligence is available in the Anomali Preferred Partner Store. With access to this new intelligence stream, joint customers can integrate a real-time, automated feed of deep and dark web indicators into their existing security infrastructure and operations via Anomali ThreatStream.

Sixgill’s cyber threat intelligence solution integrates with Palo Alto Networks Cortex XSOAR
2020-04-09 01:15

Sixgill, a leading cyber threat intelligence company, announced that its Deep and Dark Web Threat Intelligence Solution, an automated and contextual cyber threat intelligence solution, will integrate with Palo Alto Networks Cortex XSOAR, the industry's first extended security, orchestration, automation and response platform with native threat intel management that empowers security leaders with instant capabilities against threats across their entire enterprise. "Malicious actors continue to develop sophisticated new attacks with increased frequency," said Rishi Bhargava, vice president of product strategy, Cortex XSOAR at Palo Alto Networks.

How Humans "LEAD" the Way to More Effective Use of Threat Intelligence
2020-04-02 21:17

It's a topic I never tire of because not only do I believe that there is no "Silver bullet" technology, I believe it's the humans who really lead the way to greater security efficiency and effectiveness. Relevant - As security professionals, we need to change how we look at the threat landscape.

HYAS Insight: A threat intelligence solution for investigation and attribution
2020-03-19 03:30

HYAS, a leader in threat intelligence and attribution, announced HYAS Insight, a threat intelligence and attribution solution that improves visibility and productivity for analysts, researchers and investigators while vastly increasing the accuracy of their findings. HYAS Insight lets analysts connect specific attack instances and campaigns to billions of historical and real-time indicators of compromise faster than ever before, bringing invaluable new intelligence and visibility to security efforts.