Intelligence & Analytics June 7, 2018 Musings From a Coffee Bar: Threat Modeling Tips for Open Campus Security 3 min read - Chief information security officers (CISOs) shouldn't be afraid of an open campus. Threat modeling allows internal security teams to tailor security to areas that present the greatest security risk.
Intelligence & Analytics June 4, 2018 What Are the Different Types of Cyberthreat Intelligence? 7 min read - Building a cyberthreat intelligence program can be a daunting task. However, it's best to start small and grow continuously.
Intelligence & Analytics May 30, 2018 The Hack React: Testing a SOC Director’s Cybersecurity Incident Response 5 min read - When Lincoln Healthcare experiences a watering hole attack, security operations center (SOC) director Malcolm Gerhard is tasked with developing a swift cybersecurity incident response. Will he succeed?
Intelligence & Analytics May 21, 2018 How to Transform Data Into Actionable Threat Intelligence 3 min read - Threat intelligence should be translated into business-speak to help decision-makers understand the impact of potential threats and incorporate TI into their business strategies.
Intelligence & Analytics May 18, 2018 Can a Cognitive-Powered Security Intelligence Platform Bring Your SOC Up to Speed? 2 min read - Without cognitive insights, a security intelligence platform does little to ease the pressure on short-staffed security operations center (SOC) teams to analyze massive volumes of threat data.
May 17, 2018 More Than Half of Risk Assessments Spot Attempts to Bypass Security 2 min read - According to a recent insider threat report, 60 percent of risk assessments identified users who tried to bypass their employer's security measures using private or anonymous browsing.
Endpoint May 17, 2018 Achieving More Effective Security With Collaborative Defense in Depth 4 min read - Collaborative defense connects an organization's people, processes and technology to deliver improved security through open integrations, threat intelligence sharing and digital transformation.
May 16, 2018 Threat Intelligence Shows Tried and True Techniques Continue to Work for Hackers 2 min read - According to new threat intelligence data, simple threats, such as phishing and drive-by downloads, remain popular among cybercriminals.
Intelligence & Analytics May 15, 2018 Best Practices for Designing a Security Operations Center 3 min read - Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more.
Intelligence & Analytics May 14, 2018 Threat Intelligence Machine Learning Adoption: Time to Ditch the Black Box Security Analytics 4 min read - While studies reveal the majority of CTI adopters are dissatisfied with threat intelligence machine learning adoption, there's evidence the adversary is already using algorithms to their advantage.