Last month at the Gartner Security and Risk Management conference, I had the opportunity to speak with many CISOs, analysts and other security professionals....
Hi, what are you looking for?
Last month at the Gartner Security and Risk Management conference, I had the opportunity to speak with many CISOs, analysts and other security professionals....
Applying Unfiltered Threat Intelligence to Defenses Generates Significant False Positives
Late last year, a study by the US National Institute of Standards and Technology (NIST) took an in-depth look at a phenomenon called “security...
Instead of Discounting Indicators of Compromise, it’s Time to Use Them More Effectively
My good friend and (full disclosure) ThreatQuotient Board member, Marty Roesch, once said in a meeting, “Complexity is the enemy of security.” Not sure...
Defense-in-depth. It’s a philosophy we’re all familiar with: layering defenses so that if one fails, another layer is there to stop the attack. Sounds...
With Transparency and Customized Scoring, You Cancel Out The Noise That’s Distracting Your Threat Intelligence Team
Smart refrigerators can monitor your food and alert you when it is about to expire. There are apps that do this as well, keeping...
Actionable Threat Intelligence Enables a Proactive Approach to Cybersecurity, with Connectivity to the Entire Security Footprint
Computing pioneer Alan Kay once said, “Context is worth 80 IQ points.” On the IQ scale, where average is about 100 and Einstein is...
Threat Intelligence That Combines External and Internal Data Will Help You Determine What You Need to Care About in Your Environment
Defending your business and customers against cyber threats starts with understanding what you’re up against. That may sound pretty obvious; studying the adversary is...