by Jonathan Couch | Jun 28, 2016 | Blog, Threat Intelligence
Being Part of What’s Next in Threat Intelligence POSTED BY JONATHAN COUCH I’ve been in threat intelligence and security operations for most of my career, first with military, government, and intelligence organizations; then as a co-founder of iSIGHT Partners; and now...
by Mike Clark | Jun 8, 2016 | Blog, Threat Intelligence
Inside the SOC: Making The Most of Cyber Threat Intelligence POSTED BY MIKE CLARK Over the past 20 years, the security landscape has changed greatly. At the turn of the century, hackers or crackers existed but evolved to what we now call “Threat Actors.” Organized...
by Wayne Chiang | May 24, 2016 | Blog, Threat Intelligence
Core Functions of a Threat Intelligence Platform - Part 1: Intelligence Aggregation POSTED BY WAYNE CHIANG To support threat intelligence management inside a Security Operations Center (SOC), a threat intelligence platform (TIP) has core functions that it must...