BlogEXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCES
To help XDR solutions deliver on their promise, what’s needed is a platform focused on integration, serving as a central repository for data and intelligence from internal and external sources.
It is no secret that organizations are increasingly lacking cyber security experts. This applies not only to large companies, but also to government agencies, which are facing increasing threats.
Both orchestration tools and a threat intelligence platform serve the same high-level goal: Optimize people’s time so they can focus on areas where their intelligence, experience and skills are needed.
As the threat environment continues to intensify, prioritising protection against ransomware and other disruptive cyberattacks will be critical to keeping public sector services operational.
In the battle to protect businesses from relentless attempts at infiltration, theft and disruption by cybercriminals, knowledge is power.
The term “top gun” has two meanings. Loosely, it means to be the best of the best in a certain field. However, it is also the nickname for the elite U.S. Navy Strike Fighter Tactics Instructor program aimed at creating world-class fighter pilots.
We can all agree that threat intelligence plays a central role in the SOC. As you look for a solution to help you collect and correlate external and internal threat intelligence for analysis and action, there are many factors to consider.
Without the ability to catch up with co-workers in person, go out to lunch or grab a cup of coffee, you might think employees would be more focused. The reality is that most are distracted for a variety of reasons.
For any platform or product to exist in our market category, the ability to rapidly integrate is critical for its own success, and for the success of its users.
Agility, sustainability and accessibility make a good product, but rapid integrations and customizations during crises make a great one.
Leon Ward, VP of Product Management, shares his top 5 tips on how best to use ThreatQ to track COVID-19 related threat activity.
At the helm of their security organization and often in the “hot seat”, CISOs can feel alone as they try to understand the rapidly evolving external threat landscape and focus on what truly matters.
Security teams continue to face significant alert fatigue from a continual barrage of high priority alerts. The expanding threat landscape and the increasingly dynamic nature of IT operations are the primary contributors to this alert escalation.
Now that CTI has matured into a standalone program, this year the SANS survey asked specific questions about how organizations are setting up their CTI programs.
The use of cyber threat intelligence (CTI) within the security industry is widespread and increasing over time. Attackers change their methods frequently to avoid detection by defenders who use CTI.
The global shortage of cybersecurity professionals has now surpassed 4 million according to ISC2, yet the volume and velocity of increasingly sophisticated threats security teams face is on the rise.
There are two types of cyber threats that organizations deal with which can be sorted into the following categories: hurricanes and earthquakes.
When senior professionals were asked about their rise to leadership, they cite being in the right place at the right time, their experience and certifications (including staying current) as the top three reasons.
In our continuing program this month to celebrate women in cybersecurity, I wanted to tell you about an amazing group of women who have put a new twist on threat hunting.