The Industry Needs a Common Understanding of How to Best Put Threat Intelligence Into Practice “Knowledge is of no value unless you put it into...
Hi, what are you looking for?
The Industry Needs a Common Understanding of How to Best Put Threat Intelligence Into Practice “Knowledge is of no value unless you put it into...
Security Teams Need the Ability to Collaborate and Coordinate to Make Better Use of the Talent and Data They Already Have
Take Relevance Into Account When Analyzing Threat Data
The Starbucks Effect is Pervasive in the IT Industry and Threat Intelligence is Also Affected by That Movement
Over the next five years, the threat intelligence market is predicted to grow more than 18% a year and reach nearly $9 billion by...
The holidays are now behind us and we’re getting back to our routines. As we do, we start putting to use all the gifts...
2018 Should Not Be Another Year Where Attackers Continue to Exploit the Known
By Starting With the Threat You Can Easily Prioritize Vulnerabilities and “Embrace the Grey”
Applying the OODA Loop to Cybersecurity Will Help Accelerate the Process of Translating Threat Data Into Action
In the world of big data there’s something I refer to as “the Goldilocks effect” and it’s particularly problematic when it comes to cyber...
Automating Steps in the Security Process is Critical to Defeat Today’s Relentless and Complex Attacks
“What if only a machine could defeat another machine?”
Six years ago the US National Institute of Standards and Technology (NIST) put forth a framework for information security continuous monitoring (ISCM), defined as...
In my last article I shared five steps you can take to turn threat intelligence into a threat operations program, putting yourself in a...
Last month at the Gartner Security and Risk Management conference, I had the opportunity to speak with many CISOs, analysts and other security professionals....
Applying Unfiltered Threat Intelligence to Defenses Generates Significant False Positives
Late last year, a study by the US National Institute of Standards and Technology (NIST) took an in-depth look at a phenomenon called “security...
Instead of Discounting Indicators of Compromise, it’s Time to Use Them More Effectively
My good friend and (full disclosure) ThreatQuotient Board member, Marty Roesch, once said in a meeting, “Complexity is the enemy of security.” Not sure...
Defense-in-depth. It’s a philosophy we’re all familiar with: layering defenses so that if one fails, another layer is there to stop the attack. Sounds...