Threat Intelligence September 14, 2018 Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative 3 min read - Security teams can better prepare for cyberattacks by leveraging the different types of threat intelligence to inform decision-making at various levels of the enterprise.
Software Vulnerabilities September 13, 2018 New Gartner Report Recommends a Vulnerability Management Process Based on Weaponization and Asset Value 2 min read - Gartner's new report recommends factoring severity, asset value and active exploits into your vulnerability management process.
Threat Hunting September 12, 2018 A Beginner’s Guide to Threat Hunting 3 min read - Threat hunting is a complex and labor-intensive task, but it can go a long way toward helping your organization detect APTs before they can cause damage to the network.
Data Protection September 11, 2018 How Can Media Companies Be More Confident in Their Cybersecurity Strategy and Policy? 4 min read - According to recent research, only 1 percent of media companies are very confident in their cybersecurity strategy and policy.
September 10, 2018 60 Percent of Targeted Email Attacks Aimed at Contributors and Lower Management < 1 min read - A new report revealed that 60 percent of targeted email attacks were aimed at individual contributors and lower-level management between April and June 2018.
Malware September 10, 2018 IBM X-Force Delves Into ExoBot’s Leaked Source Code 9 min read - IBM X-Force researchers unpacked ExoBot's inner workings to reveal insights into its dynamic mechanisms and the features that help criminals use it in cross-channel bank fraud schemes.
Intelligence & Analytics August 28, 2018 3 Key Areas of Security Operations to Benchmark and Evaluate 3 min read - SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow.
Threat Intelligence August 22, 2018 What’s In a (Threat Intelligence) Name? 8 min read - A lot of things in the threat intelligence world have multiple names, and these aliases often complicate the process of researching and dealing with security threats.
Incident Response August 20, 2018 How to Leverage Log Services to Analyze C&C Traffic 6 min read - Security teams can generate valuable insights about ongoing attacks by using log services and threat intelligence to analyze C&C traffic.
CISO August 14, 2018 A Black Hat Veteran Reflects on the Hot Topics at This Year’s Conference 2 min read - Topics of discussion at this year's Black Hat conference included the Internet of Things (IoT) in smart cities, the latest advancements in vulnerability management and more.