Threat Intelligence May 8, 2015 Threat Kinetics: The Arms Race Between Black Hat and White Hat Developers 3 min read - The evolution of threat kinetics to identity kinetics is rapidly advancing, and there are a plethora of organizations pursuing this avenue.
Intelligence & Analytics March 16, 2015 Analyzing Queries on a Honeypot Name Server for Better DNS Log Quality 8 min read - Monitoring a honeypot name server for queries in a public cloud is an easy and popular way of collecting data on "Internet noise."