by Liz Bush | May 21, 2019 | Blog, Cybersecurity
Overcome the Vulnerability Management Challenge with ThreatQ POSTED BY LIZ BUSH The security industry has talked for years about the importance of vulnerability management as a basic security measure to prevent attacks. Yet vulnerabilities, and the exploitation of...
by Jonathan Couch | May 14, 2019 | Blog, Cybersecurity
Collaboration with Law Enforcement and Dynamic Cybersecurity: Building a Robust Defense POSTED BY JONATHAN COUCH Proactivity is now seen by security teams as a viable solution to the challenge of defending enterprises against the ever-growing threat landscape. This...
by Liz Bush | May 7, 2019 | Blog, Cybersecurity, Threat Intelligence
3 Tips to Improve Your Alert Triage Process POSTED BY LIZ BUSH Defense-in-depth is a strategy we’re all familiar with – layering defenses so that if one fails, another layer is there to stop the attack. However, one of the challenges with this approach is that each...
by Liz Bush | Apr 30, 2019 | Blog, Cybersecurity, Threat Intelligence
What Financial Services Institutions Should Know About Social Media Risk POSTED BY LIZ BUSH Three out of four banking customers surveyed agree or strongly agree that social media is important to their banks, with Facebook, LinkedIn, Twitter, YouTube and Instagram...
by Liz Bush | Apr 23, 2019 | Blog, Cybersecurity, Threat Intelligence
How to Tackle the Challenges of Threat Hunting POSTED BY LIZ BUSH In the SANS 2018 Cyber Threat Intelligence Survey, 81% of cybersecurity professionals affirm that threat intelligence is providing value and helping them do their jobs better. But are they capturing all...
by Liz Bush | Apr 16, 2019 | Blog, Cybersecurity, Threat Intelligence
8 Key Questions to Ask About Operating a TIP in an Air-Gapped Environment POSTED BY LIZ BUSH If your organization uses air-gapping to protect critical systems, you may be wondering about the implications for using threat intelligence. After all, most threat...