by Anthony Stitt | Aug 17, 2021 | Blog, Cybersecurity, Threat Intelligence
Defence Engineering and Threat Intel - No Stone Left Unturned ANTHONY STITT Every breach starts as a compromise that goes unnoticed and unactioned, often because existing security devices have too many events, too little context and cannot prioritize. Providing these...
by Andy Gepert | Aug 10, 2021 | Blog, Cybersecurity, Threat Intelligence
Are You Prepared to Better Protect Against SANS’ Top Attacks and Threats? ANDY GEPERT The SANS 2021 Top New Attacks and Threat Report is now available for download, covering the security trends and top threats to watch for as the world emerges from the pandemic....
by Marc Solomon | Aug 5, 2021 | Media Coverage
Solving security’s big data problem is about prioritized data flow, continuously processing data for analysis and translating and exporting it to create a single security infrastructure Typically, when someone says “security is a big data problem” they’re...
by Jonathan Couch | Aug 3, 2021 | Media Coverage
There is a lot of attention on Operational Technology (OT) networks and critical infrastructure companies as of late. The Russians have targeted the Ukrainian energy sector since 2015, and now Russian-based actors are believed to be behind the Colonial Pipeline...
by Anthony Stitt | Aug 3, 2021 | Blog, Cybersecurity, Threat Intelligence
Threat Intelligence Management – the Foundational Use Case for a TIP ANTHONY STITT I previously talked about how to get started with a threat intelligence program, which is the cornerstone to any security operation. Such a program enables security teams to gain a...