by Steve Rivers | Apr 28, 2020 | Blog, Cybersecurity, Threat Intelligence
Making Better Security Decisions…Faster! POSTED BY STEVE RIVERS Over the past twelve months enterprises continue to face further onslaught of security data from disparate systems, platforms and applications concerning the state of the network, potential threats and...
by Liz Bush | Apr 21, 2020 | Blog, Cybersecurity, Threat Intelligence
Learn What 1,000 of Your Peers are Saying About Cyber Threat Intelligence POSTED BY LIZ BUSH The SANS 2020 Cyber Threat Intelligence (CTI) Survey is now available and includes responses from a record 1,006 security professionals. More organizations than ever report...
by Anthony Stitt | Apr 14, 2020 | Blog, Cybersecurity, Threat Intelligence
Are you maximizing the value of your cyber threat intelligence investment? POSTED BY ANTHONY STITT The use of cyber threat intelligence (CTI) within the security industry is widespread and increasing over time. Attackers change their methods frequently to avoid...
by Liz Bush | Apr 8, 2020 | Blog
See how to Enhance Orchestration using Threat Intelligence POSTED BY LIZ BUSH The global shortage of cybersecurity professionals has now surpassed 4 million according to ISC2, yet the volume and velocity of increasingly sophisticated threats security teams face is on...
by Jonathan Couch | Mar 31, 2020 | Blog, Cybersecurity, Threat Intelligence
Threat Intelligence Decoded JONATHAN COUCH There are two types of cyber threats that organizations deal with which can be sorted into the following categories: hurricanes and earthquakes. Hurricanes, much like their namesake, are those attacks you can see coming and,...
by Liz Bush | Mar 24, 2020 | Blog, Cybersecurity
New Research Uncovers Keys to Success for Women in Cybersecurity POSTED BY LIZ BUSH As part of our month-long celebration of women in cybersecurity, we’re pleased to make available to you a complimentary copy of the latest research by SANS, “Women in Cybersecurity:...