10 Ways to Fight Advanced Malware With Threat Intelligence Sharing

Read Christian Falco list 10 ways to fight advanced malware with threat intelligence sharing on Security Intelligence : Last month, we celebrated the two-year anniversary of the IBM X-Force Exchange (XFE). During that week, the threat intelligence sharing platform reached a record spike in traffic as users flocked to the site to stay up to date […]

Threat Intelligence: A New Frontier in Cybersecurity

Read Patrick Donegan’s article about why threat intelligence is the new frontier of cyber security on Light Reading : In military strategy and tactics surveillance, reconnaissance and intelligence have always played a critical role in developing a winning strategy. Knowing the enemy’s historical as well as current capabilities and tactics, and gaining insight into how they […]

Getting threat intelligence right

Read why Aaron Tan says that companies need to get their threat intelligence strategy right on Computer Weekly : When shoppers went about their usual routine at two malls in the heart of Singapore on 20 May, they were greeted with an unexpected message that popped up on the stores’ digital directories. Read his full […]

How a Common Language for Cyber Threats Boosts Security

Read why Steve Kirk says that having a common cyber security language can boost threat cooperation between companies on Next Gov : Cyberattacks are increasing in frequency, and government agencies are under constant attack. This nonstop assault is facilitated by the rapidly growing complexity of today’s networks. Cloud-based services, internet-of-things devices, bring-your-own-device programs and wireless […]

Threat Intelligence in the Age of Cyber Warfare

Read  Eli Ben Meir’s article about the importance of threat intelligence on Security Intelligence : The cyber age has brought incalculable advantages to modern life. The world is connected and accessible like never before. But like all technological advances, there is a dark side to this progress: Quite simply, the cyber age is revolutionizing warfare. […]

Do Collaboration Tools Create Security Risks For Your Business?

Read Liz Alton take a look at whether collaboration tools create security risks for your business on Forbes : As companies adopt more diverse technology tools focused on collaboration, security concerns increase. Studies consistently show security is a top focus for companies investing in tools – and these concerns extend to collaboration tools, which can […]

‘Critical challenges’ in threat intel sharing, McAfee report

In its just released report examining the background and drivers of threat intelligence sharing, McAfee researchers said the security industry is facing “critical challenges” in exchanging intel with partners. Read about the new report by McAfee which reveals that threat intelligence sharing among businesses faces many challenges on SC Magazine.

McAfee report reveals five challenges to cyber threat intelligence

There are five key challenges to cyber threat intelligence sharing, according to the latest threat report by McAfee Labs. “The security industry faces critical challenges in our efforts to share threat intelligence between entities, among supplier solutions and even in their portfolios,” said Vincent Weafer, vice-president of McAfee Labs. Read more about the new report by […]

Collaboration is the Key to Effective Cyber-defense

Read why Richard Wilding says that collaboration is the key to effective cyber defense on Infosec Magazine : Every year, cybersecurity rises up the business agenda. Today, putting the right protection and protocols in place to defend against growing cyber-risks is front of mind for boardrooms around the world. Our recent global research into cybersecurity confirms that […]

All U.S. Companies Need to Share Cybersecurity Threat Data

Read why Daniel R. Stoller says that all companies based in United States need to share cyber security threat data and intelligence on Bloomberg BNA : U.S. companies large and small feeling the burn in the aftermath of a data breach are struggling to find resources to bolster their security systems, cybersecurity industry panelists said at a […]