by Steve Rivers | Apr 9, 2019 | Blog, Cybersecurity, Threat Intelligence
A Maturity Model for Deriving Value from the MITRE ATT&CK Framework POSTED BY STEVE RIVERS For decades, security professionals have been stuck in a pattern of adding the latest technology or another threat feed to improve their security posture. Clearly this approach...
by Jon Warren | Apr 2, 2019 | Blog, Cybersecurity, Threat Intelligence
Prioritization is Key to Effective Vulnerability Management POSTED BY JON WARREN Most cyber criminals exploit known vulnerabilities to launch attacks. They take the path of least resistance, reusing exploits and tools that have been effective in the past, making...
by Liz Bush | Mar 26, 2019 | Blog, Cybersecurity, Threat Intelligence
The MITRE ATT&CK Framework – A Sign of the Times POSTED BY LIZ BUSH There was a time when we believed that we could prevent every attack. But despite a defense-in-depth strategy, as the years progressed we realized this wasn’t possible. Attacks are happening with...
by Alison Adkins | Mar 21, 2019 | Blog, Cybersecurity
RSAC USA: Then and Now POSTED BY ALISON ADKINS From the first RSAC USA in 1991 to the latest conference wrapping up just two weeks ago, there have been many changes. Although US fashion trends from the early 90’s may have peaked, disappeared and resurfaced in 2019...
by Liz Bush | Mar 12, 2019 | Blog, Cybersecurity, Threat Intelligence
Spear Phishing Analysis Using ThreatQ and ThreatQ Investigations POSTED BY LIZ BUSH Although spear phishing has been around for years, organizations continue to fall victim as criminals evolve their methods. According to the most recent quarterly report from the Anti...
by Liz Bush | Mar 6, 2019 | Blog, Cybersecurity
Got 12 Minutes? See ThreatQuotient and Cisco Integration in Action POSTED BY LIZ BUSH If you haven’t seen it yet, I encourage you to check out this recent episode of ThreatWise TV – coverage and live demos of the latest developments in Cisco cybersecurity, hosted by...