What to watch out for leading into the 2024 election season It is hard to reflect on cyber “lessons learned” from 2022 without incorporating impacts from the war in Ukraine. Commercial, unclassified intelligence was key to predicting the imminent Russian invasion. Cyber activities were indicative of future kinetic activities on the battlefield. Ukraine also showed […]
Historically, the U.S. government has relied almost solely on its own intelligence analysis to inform strategic decisions. This has been especially true surrounding geopolitical events and nation-level cybersecurity situations. However, the explosion of assets being connected to the internet, along with the fact that most critical infrastructure is owned by private sector organizations, means that […]
Between multi-cloud deployments, more employees working remotely, and increasing use of SaaS applications, the number of entry points for attackers to infiltrate your systems has exploded. But gaining visibility into all these possible attack vectors is time-consuming and often incomplete or just a snapshot in time. If the first rule of cyber is to “know […]
One of the greatest takeaways from the war in Ukraine is the unprecedented reliance on commercial technology shaping the conflict. This, combined with the global interconnectedness and interdependence of today’s technology, expands the attack surface well beyond the traditionally geographically confined aspects of war. I
In just a few months, the COVID-19 pandemic sped up digital transformation by years. In 2019, Statista showed that a little less than 1.2 trillion U.S. dollars were spent on digital transformation efforts – by 2025, global digital transformation spending is forecast to reach 2.8 trillion U.S. dollars.
According to the 2021 Gartner® Market Guide for Security Threat Intelligence Products and Services, “the threat intelligence market consists of multiple solutions and services to help organizations understand and prepare for their own unique threat landscape, to bolster prevention and predication capabilities, as well as to help improve other operations efforts like incident response, threat hunting, and vulnerability management.”