by Ryan Trost | Jul 18, 2018 | Blog, Cybersecurity, Threat Intelligence
Victimology: Target Association POSTED BY RYAN TROST In a previous life, I managed two SOCs with 40+ analysts each, where a large component of the team was dedicated to threat intelligence, more specifically victimology. Admittedly I am by no means an expert at...
by Liz Bush | Jul 10, 2018 | Blog, Cybersecurity, Threat Intelligence
Need Some Tips on TIPs? POSTED BY LIZ BUSH Check out our new Buyer’s Guide Is your organization one of the many that is in the process of establishing its own threat intelligence operations, building Security Operations Centers (SOCs), incident response (IR)...
by Neal Humphrey | Jun 19, 2018 | Blog, Cybersecurity, Threat Intelligence
The Advisor’s Workbench POSTED BY NEAL HUMPHREY In my last blog, I talk about some of the changes and opinions I see in the market and started a discussion around a label and a definition of a role that while new, someone(s) is already performing within security...
by Ryan Trost | Jun 13, 2018 | Blog, Cybersecurity
Moving to the Cloud? Buckle Up! POSTED BY RYAN TROST What seems like a million years ago, before “real” password management and Active Directory, user passwords were stored locally on each device itself. This caused regular maintenance to be a monumental effort and...
by Neal Humphrey | May 30, 2018 | Blog, Cybersecurity, Threat Intelligence
Rise of the Advisor: - RSA, Buzzwords, Automation, and a Path Forward POSTED BY NEAL HUMPHREY It’s been about two months since the end of RSA 2018, and about a month since the end of the avalanche of emails and phone calls (for what it is worth, I apologize). I think...
by Leon Ward | May 8, 2018 | Blog, Cybersecurity
Getting your Company out of a Crisis Situation POSTED BY LEON WARD Why situation rooms hold the key to dealing with a data breach You can imagine a scene in an action movie where the president is briefed on an ongoing incident, surrounded by generals, and chiefs of...