by Markus Auer | Feb 4, 2020 | Blog, Cybersecurity, Threat Intelligence
If You’re Only Focused on Patching, You’re Not Doing Vulnerability Management POSTED BY MARKUS AUER When I speak to security professionals about vulnerability management, I find that there is still a lot of confusion in the market. Most people immediately think I’m...
by Liz Bush | Jan 28, 2020 | Blog, Cybersecurity, Threat Intelligence
See How to Leverage Threat Intelligence for Effective Vulnerability Management POSTED BY LIZ BUSH Vulnerability management is a challenge for many organizations. If not done efficiently and effectively, it can lead to a data breach. However, it is simply impossible to...
by Liz Bush | Jan 22, 2020 | Blog, Cybersecurity, Threat Intelligence
Struggling to Make Better Security Decisions? These Tips Can Help POSTED BY LIZ BUSH Unintended consequences – the unforeseen outcomes of actions we take – are all around us. It may be an unforeseen benefit, but, more frequently, it’s an unexpected drawback that can...
by Ryan Trost | Jan 14, 2020 | Blog, Cybersecurity, Threat Intelligence
Cyber Predictions for 2020 POSTED BY RYAN TROST As the 2020 budget meetings come and go – teams are forced to assess their current defenses by analyzing their historical attacks in order to anticipate/predict future attack trends. A difficult but worthwhile...
by Liz Bush | Jan 7, 2020 | Blog, Cybersecurity, Threat Intelligence
Threat Hunting: Survey Results from the Trenches – Part 3 POSTED BY LIZ BUSH In Part 2 of this series we talked about common methodologies for threat hunting. Now, let’s look at how organizations are executing threat hunting – specifically the investments they’re...
by Liz Bush | Dec 17, 2019 | Blog, Cybersecurity, Threat Intelligence
Threat Hunting: Survey Results from the Trenches – Part 2 POSTED BY LIZ BUSH In Part 1 of this series, I shared the state of threat hunting as measured by SANS in their 2019 survey of threat hunters and security managers from various organizations around the globe....