Data Protection September 11, 2018 How Can Media Companies Be More Confident in Their Cybersecurity Strategy and Policy? 4 min read - According to recent research, only 1 percent of media companies are very confident in their cybersecurity strategy and policy.
September 10, 2018 60 Percent of Targeted Email Attacks Aimed at Contributors and Lower Management < 1 min read - A new report revealed that 60 percent of targeted email attacks were aimed at individual contributors and lower-level management between April and June 2018.
Malware September 10, 2018 IBM X-Force Delves Into ExoBot’s Leaked Source Code 9 min read - IBM X-Force researchers unpacked ExoBot's inner workings to reveal insights into its dynamic mechanisms and the features that help criminals use it in cross-channel bank fraud schemes.
Intelligence & Analytics August 28, 2018 3 Key Areas of Security Operations to Benchmark and Evaluate 3 min read - SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow.
Threat Intelligence August 22, 2018 What’s In a (Threat Intelligence) Name? 8 min read - A lot of things in the threat intelligence world have multiple names, and these aliases often complicate the process of researching and dealing with security threats.
Incident Response August 20, 2018 How to Leverage Log Services to Analyze C&C Traffic 6 min read - Security teams can generate valuable insights about ongoing attacks by using log services and threat intelligence to analyze C&C traffic.
CISO August 14, 2018 A Black Hat Veteran Reflects on the Hot Topics at This Year’s Conference 2 min read - Topics of discussion at this year's Black Hat conference included the Internet of Things (IoT) in smart cities, the latest advancements in vulnerability management and more.
Incident Response August 13, 2018 How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management 5 min read - The lifecycle management of indicators is an important element to support decisions and actions against attackers. This process informs the courses of action matrix to build a response plan.
August 13, 2018 Malicious Email Payloads Increased in Volume and Diversity in Q2 2018 2 min read - A quarterly threat report revealed that malicious email attacks increased by 36 percent and delivered more diverse payloads in Q2 2018.
Threat Hunting August 10, 2018 Know Your Enemy: How to Build a Successful Threat Hunting Program 3 min read - To build a successful threat hunting program, you must thoroughly understand who might attack your organization, what these malicious actors might be after and what tactics they'll use to get it.