Using Threat Intelligence to Improve Healthcare Cybersecurity

While 84 percent of organizations consider threat intelligence “essential to a strong security posture,” entities admit that the large amount of threat data and a lack of staff expertise lower their threat program effectiveness, according to a recent Anomali and Ponemon study. Read about the new Anomali and Ponemon study which reveals that 80 percent of […]

Business Risk Intelligence: The New Industry Standard

Read Josh Lefkowitz’s article about business risk intelligence on Security Week : Intelligence in its various forms has long served as the foundation for many organizations’ cybersecurity strategies. And yet, only in recent years has the industry begun to recognize that certain types of intelligence — namely that which is relevant, actionable, and gleaned from […]

Threat Intelligence Strategies Suffer from Data Overload

While 86% of organizations believe threat intelligence is valuable to their security mission, many of them struggle with an overwhelming amount of threat data and a lack of staff expertise to make the most of their threat intelligence programs. Read more about the new report by Ponemon Institute, which found that 80% of North American organizations […]

Using Threat Intelligence to Improve Healthcare Cybersecurity

While 84 percent of organizations consider threat intelligence “essential to a strong security posture,” entities admit that the large amount of threat data and a lack of staff expertise lower their threat program effectiveness, according to a recent Anomali and Ponemon study. Read about the new study by Ponemon Institute which reveals that 84 percent […]

Threat Hunting: The What, Why and Who?

Read Rishi Bhargava’s article about threat hunting on Infosec Magazine : Three things are required before an adversary can be considered a threat: opportunity, intent and capability to cause harm. No cybersecurity system is impenetrable or capable of recognizing or stopping every potential threat. Read his full article here.

Threat intelligence fails to deliver on its promise

A new study by the Information Security Forum (ISF), an independent authority on cyber security and information risk management, reveals that threat intelligence isn’t delivering the expected business objectives. Read about the new study by Information Security Forum (ISF) which reveals that 82 percent members surveyed have a threat intelligence capability, with the remaining 18 percent planning […]

10 Ways to Fight Advanced Malware With Threat Intelligence Sharing

Read Christian Falco list 10 ways to fight advanced malware with threat intelligence sharing on Security Intelligence : Last month, we celebrated the two-year anniversary of the IBM X-Force Exchange (XFE). During that week, the threat intelligence sharing platform reached a record spike in traffic as users flocked to the site to stay up to date […]

Most Organizations Not Satisfied with Threat Intelligence

With an eye toward gaining intel about attacks from adversaries, the vast majority of companies have threat intelligence in place but only a quarter are achieving the desired business goal, according to a report released today by the Information Security Forum (ISF). Read about the new report released by Information Security Forum (ISF) which reveals that […]

Accelerate Incident Response with Threat Intelligence

The white paper shows how Threat Intelligence improves Incident Response (IR), as it leads to both faster escalation and faster reaction. Download the whitepaper about how companies can accelerate incident response with threat intelligence on Infosec Magazine.

Threat Intelligence: A New Frontier in Cybersecurity

Read why Patrick Donegan says that threat intelligence is a new frontier in cyber security on Light Reading : In military strategy and tactics surveillance, reconnaissance and intelligence have always played a critical role in developing a winning strategy. Knowing the enemy’s historical as well as current capabilities and tactics, and gaining insight into how they […]