LookingGlass Cyber Solutions, an Arlington, VA-based provider of threat intelligence solutions, has acquired open-source threat intelligence firm Cyveillance for $35 million in cash and raised $50 million in funding. [Read More]
EU member states and lawmakers have clinched a deal to prevent cyber attacks by requiring Internet firms like eBay, Amazon and Google to boost their defenses and report breaches, officials said Tuesday. [Read More]
Cyber Threat Intelligence (CTI) is critical for organizations that want to gain a comprehensive, tailored and relevant view of the potential threats and types of attackers that could be targeting them.
Attackers are thinking outside the box, using sophisticated breach methods and taking advantage of a very collaborative ecosystem. Perhaps it’s time to supplement all our security defenses with a hacker-centric security paradigm.
The DHS initiated the Continuous Diagnostics and Mitigation program to safeguard and secure Federal Information Technology networks. But can the DHS CDM program really strengthen the security posture of government networks?
Incident response is about taking action on those informed decisions. Once a threat is understood, it should be contained and remediated and security teams should respond quickly to minimize or eliminate damage to the organization.
IT practitioners must learn to think, and communicate, like a board member. One opportunity for security leaders and CISOs to showcase their executive skills comes in the form of defending their budgets.
Everyone is talking about the shortage in security talent. Literally, everyone. It’s not for naught though, when you look at the sheer volume of open positions out there. We must have a talent shortage, right?
The broad reach of GRC solutions creates a unique set of deployment challenges from both a technical and business perspective. This raises the question – how can organizations avoid common GRC pitfalls?