by Liz Bush | Sep 1, 2020 | Blog, Cybersecurity, Threat Intelligence
Are You Maximizing MITRE ATT&CK? Insights from the new SANS Whitepaper Will Help POSTED BY LIZ BUSH The MITRE ATT&CK framework has become a game-changing tool for security teams to assess their organization’s security posture vis-á-vis specific attack methods....
by Ryan Trost | Aug 18, 2020 | Blog, Cybersecurity, Threat Intelligence
Spike in Cloud Attacks Shows Businesses were not Prepared to Work from Home POSTED BY RYAN TROST Businesses continue to place more and more data in the cloud, from personal details to intellectual property. The growing adoption of cloud-based solutions by businesses,...
by Liz Bush | Aug 12, 2020 | Blog, Cybersecurity, Threat Intelligence
Evaluating Threat Intelligence Solutions? Download the New Gartner Market Guide POSTED BY LIZ BUSH The surge in the number of remote workers, connected devices, email traffic and new technologies in use over the past few months, has created an explosion of...
by Liz Bush | Aug 4, 2020 | Blog, Cybersecurity, Threat Intelligence
See How a Security Team Delivers on the CISO’s Directive to Mitigate Risks from Emerging Threats POSTED BY LIZ BUSH During times of crisis and major events, opportunistic cyber criminals take advantage of human nature to launch attacks. The most recent example is...
by Liz Bush | Jul 28, 2020 | Blog, Cybersecurity, Threat Intelligence
How Airbus CyberSecurity is Scaling and Enriching Threat Intelligence with ThreatQ POSTED BY LIZ BUSH Mention the name “Airbus” and many people think of aircraft, particularly the iconic A380 – the first full, double-deck jet airliner. But there are many facets to...
by Markus Auer | Jul 21, 2020 | Blog, Cybersecurity, Threat Intelligence
Government agencies under attack: How a SOC can protect against cyber threats POSTED BY MARKUS AUER Traditionally, large companies have been the main targets of hackers, as they attract potentially high ransom money. It goes without saying, however, that it is...