Intelligence & Analytics September 19, 2016 Threats Driving You Nuts? Try Threat Hunting With Sqrrl 3 min read - Sqrrl enables security professionals to detect and analyze threats that slip through the cracks of other threat hunting solutions.
Malware September 15, 2016 Hey Dridex, Tu Runā Latviski? 5 min read - IBM X-Force Research reported that Dridex recently conducted attacks in unlikely areas, such as Latvia, Lithuania, Estonia and Ukraine.
Intelligence & Analytics September 13, 2016 Threat Intelligence: Is Your Current Capability Comprehensive? 2 min read - While many threat intelligence capabilities focus on delivering information to lower-tier analysts, an effective solution extends right up to the CISO.
Energy & Utility September 8, 2016 Keeping the Lights On: Security Trends in the Energy and Utilities Industry 2 min read - The energy and utilities industry is built on a highly regulated framework — but that doesn't mean it's immune to the threat of a cyberattack.
Intelligence & Analytics September 5, 2016 Take Advantage of Security Cheat Codes With Behavioral Intelligence 4 min read - Behavioral intelligence helps analysts understand behavior patterns to sniff out insider threats before they occur — a kind of cheat code for IT security.
CISO August 22, 2016 Threat Modeling in the Enterprise, Part 3: Understanding the Context 3 min read - When evaluating overall risk in the context of threat modeling, it is important to identify the threat actors, their motivations and their capabilities.
Intelligence & Analytics August 18, 2016 The Case for Managed Security Monitoring 2 min read - Managed security monitoring solutions can help organizations identify and analyze threats more effectively than internal resources.
CISO August 15, 2016 Threat Modeling in the Enterprise, Part 2: Understanding the Process 3 min read - The output of a carefully executed threat modeling exercise can be extremely valuable when informing your security control selection process.
Government August 10, 2016 Government Data Woes: 2016 Compromised Records Surpass Total for Last Three Years Combined 5 min read - Government entities in the U.S. and abroad have been targeted by malware infections, phishing schemes, SQL injection attacks and more.
CISO August 8, 2016 Threat Modeling in the Enterprise, Part 1: Understanding the Basics 5 min read - Threat modeling allows enterprises to manage risk more effectively and build a better understanding of the possible attack vectors.