Please turn on your JavaScript for this page to function normally.
Face
The great attribution debate: Why we should focus on HOW not WHO

Organisations often don’t understand what they need to be protecting themselves from when it comes to costly cyber-attacks. The threat landscape is becoming ever-more …

roads
Most remain dissatisfied with threat intelligence quality and accuracy

While security professionals are increasingly recognizing the importance of threat intelligence, the majority remain dissatisfied with its accuracy and quality, according to a …

threat intelligence market
Global threat intelligence market to reach $12.6 billion by 2025

The global threat intelligence market is anticipated to reach $12.6 billion by 2025, according to a new report by Grand View Research, Inc. The growing demand for threat …

find
The impact of threat hunting on your security operations

The main goal of threat hunting is to find traces attackers have left behind in the organization’s IT environment. These traces can date back to already solved crises or …

chess
Using a robust platform for cyber threat analysis training

We have recognised threats coming more regularly from varied origins such as nation-states, hacktivist and cybercriminal actors. Coupled with many new public policies aimed at …

Which security investments make a difference?

Costly cyber attacks are having a significant and growing financial impact on businesses worldwide. According to Accenture and the Ponemon Institute, in 2017 the average cost …

threat intelligence
Organizations struggle to maximize the value of threat intelligence

Amidst growing concerns of large-scale cyber attacks, 84 percent of organizations participating in a Ponemon Institute survey indicated threat intelligence is “essential …

InfoArmor
Leveraging social media in advanced threat intelligence

In this podcast recorded at Black Hat USA 2017, Christian Lees, CISO at InfoArmor, discusses how leveraging social media helps to understand the motives and threat landscape …

Sqrrl
Sqrrl empowers threat hunters with self-service analytics

Today, analysts must either have advanced data science skills to build hunting algorithms that detect suspicious cyber behaviors or rely on blackbox vendor tools that package …

building
STIX and TAXII: Sharing cyber threat intelligence

In this podcast recorded at Black Hat USA 2017, Allan Thomson, CTO at LookingGlass Cyber Solutions, talks about STIX and TAXII. STIX (Structured Threat Information Expression) …

dark web mapped
Security analytics and operations are becoming more difficult

A new Enterprise Strategy Group (ESG) study, which involved a survey of more than 400 IT and cybersecurity professionals, found that 72 percent feel cybersecurity analytics …

Cisco, IBM Security
Cisco and IBM Security announce services and threat intelligence collaboration

In a new agreement, Cisco and IBM Security will work closer together across products, services and threat intelligence for the benefit of customers. Cisco security solutions …

Don't miss

Cybersecurity news