by Liz Bush | May 7, 2019 | Blog, Cybersecurity, Threat Intelligence
3 Tips to Improve Your Alert Triage Process POSTED BY LIZ BUSH Defense-in-depth is a strategy we’re all familiar with – layering defenses so that if one fails, another layer is there to stop the attack. However, one of the challenges with this approach is that each...
by Liz Bush | Apr 30, 2019 | Blog, Cybersecurity, Threat Intelligence
What Financial Services Institutions Should Know About Social Media Risk POSTED BY LIZ BUSH Three out of four banking customers surveyed agree or strongly agree that social media is important to their banks, with Facebook, LinkedIn, Twitter, YouTube and Instagram...
by Liz Bush | Apr 23, 2019 | Blog, Cybersecurity, Threat Intelligence
How to Tackle the Challenges of Threat Hunting POSTED BY LIZ BUSH In the SANS 2018 Cyber Threat Intelligence Survey, 81% of cybersecurity professionals affirm that threat intelligence is providing value and helping them do their jobs better. But are they capturing all...
by Liz Bush | Apr 16, 2019 | Blog, Cybersecurity, Threat Intelligence
8 Key Questions to Ask About Operating a TIP in an Air-Gapped Environment POSTED BY LIZ BUSH If your organization uses air-gapping to protect critical systems, you may be wondering about the implications for using threat intelligence. After all, most threat...
by Steve Rivers | Apr 9, 2019 | Blog, Cybersecurity, Threat Intelligence
A Maturity Model for Deriving Value from the MITRE ATT&CK Framework POSTED BY STEVE RIVERS For decades, security professionals have been stuck in a pattern of adding the latest technology or another threat feed to improve their security posture. Clearly this approach...
by Jon Warren | Apr 2, 2019 | Blog, Cybersecurity, Threat Intelligence
Prioritization is Key to Effective Vulnerability Management POSTED BY JON WARREN Most cyber criminals exploit known vulnerabilities to launch attacks. They take the path of least resistance, reusing exploits and tools that have been effective in the past, making...