Take Relevance Into Account When Analyzing Threat Data
Hi, what are you looking for?
Take Relevance Into Account When Analyzing Threat Data
The Starbucks Effect is Pervasive in the IT Industry and Threat Intelligence is Also Affected by That Movement
Over the next five years, the threat intelligence market is predicted to grow more than 18% a year and reach nearly $9 billion by...
The holidays are now behind us and we’re getting back to our routines. As we do, we start putting to use all the gifts...
2018 Should Not Be Another Year Where Attackers Continue to Exploit the Known
By Starting With the Threat You Can Easily Prioritize Vulnerabilities and “Embrace the Grey”
Applying the OODA Loop to Cybersecurity Will Help Accelerate the Process of Translating Threat Data Into Action
In the world of big data there’s something I refer to as “the Goldilocks effect” and it’s particularly problematic when it comes to cyber...
Automating Steps in the Security Process is Critical to Defeat Today’s Relentless and Complex Attacks
“What if only a machine could defeat another machine?”
Six years ago the US National Institute of Standards and Technology (NIST) put forth a framework for information security continuous monitoring (ISCM), defined as...
In my last article I shared five steps you can take to turn threat intelligence into a threat operations program, putting yourself in a...