by Ryan Trost | Aug 18, 2020 | Blog, Cybersecurity, Threat Intelligence
Spike in Cloud Attacks Shows Businesses were not Prepared to Work from Home POSTED BY RYAN TROST Businesses continue to place more and more data in the cloud, from personal details to intellectual property. The growing adoption of cloud-based solutions by businesses,...
by Liz Bush | Aug 12, 2020 | Blog, Cybersecurity, Threat Intelligence
Evaluating Threat Intelligence Solutions? Download the New Gartner Market Guide POSTED BY LIZ BUSH The surge in the number of remote workers, connected devices, email traffic and new technologies in use over the past few months, has created an explosion of...
by Liz Bush | Aug 4, 2020 | Blog, Cybersecurity, Threat Intelligence
See How a Security Team Delivers on the CISO’s Directive to Mitigate Risks from Emerging Threats POSTED BY LIZ BUSH During times of crisis and major events, opportunistic cyber criminals take advantage of human nature to launch attacks. The most recent example is...
by Liz Bush | Jul 28, 2020 | Blog, Cybersecurity, Threat Intelligence
How Airbus CyberSecurity is Scaling and Enriching Threat Intelligence with ThreatQ POSTED BY LIZ BUSH Mention the name “Airbus” and many people think of aircraft, particularly the iconic A380 – the first full, double-deck jet airliner. But there are many facets to...
by Markus Auer | Jul 21, 2020 | Blog, Cybersecurity, Threat Intelligence
Government agencies under attack: How a SOC can protect against cyber threats POSTED BY MARKUS AUER Traditionally, large companies have been the main targets of hackers, as they attract potentially high ransom money. It goes without saying, however, that it is...
by Markus Auer | Jul 14, 2020 | Blog, Cybersecurity, Threat Intelligence
Lack of experts in cyber security POSTED BY MARKUS AUER Platforms can help increase effectiveness and efficiency The Internet and digital change are advancing continuously and the associated expansion of IT infrastructures is proving to be an important factor in the...