Overcoming the Cyber Skills Gap

Bridging The Cybersecurity Skills Gap

October 10, 2018

The cybersecurity industry is in a crisis. The cost of a data breach hit a whopping $3.86 million (a 6.4% increase from 2017), cybersecurity is con...

Read more >
anomaly-detection-cyber-threat-intelligence

Anomalies in Cyber Threat Intelligence

September 13, 2018

We often use anomaly detection to identify potential malicious activity within our organizations, with the data of choice being network telemetry o...

Read more >
ConnectedData4

The Importance of Connected Data in Threat Intelligence

August 22, 2018

One of the biggest challenges threat analysts face today is assessing the validity of threat intelligence feeds. Many of those threat intelligence ...

Read more >
How to Improve CTI Automation

How to Improve Your Cyber Threat Intelligence Automation

July 25, 2018

The cybersecurity industry is developing more in cyber threat intelligence automation. See our 3 key insights into where you can focus improvement...

Read more >
Honeypot Blog

Protection via Deception: How Honeypots Confuse – and Defeat – Hackers

July 18, 2018

To tweak a traditional saying, you can do a better job catching flies with honey than vinegar. In this case, I’m talking about the “honeypot,” set ...

Read more >
Figure 2 depicts a sharing community of four organizations. Dotted lines depict how feedback loops within each organization can be connected to share threat intelligence.

Challenging the Economics of Cybersecurity with Cyber Threat Intelligence-Sharing Programs: Part 2

June 12, 2018

In the first part of this series, I defined cyber threat intelligence sharing and how it can benefit your organization, as well as between organiza...

Read more >
Figure 2 depicts a sharing community of four organizations. Dotted lines depict how feedback loops within each organization can be connected to share threat intelligence.

Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

May 23, 2018

Defending your organization from cyber-attacks is a daunting challenge when the economics of cybersecurity favors the attacker. For an organization...

Read more >
threat-intelligence-briefs

Why Cyber Response Mechanisms Must Talk to Each Other… part 2

April 30, 2018

In part 1 of this blog series I highlighted why organizations require independent cyber security systems that can be combined in a collaborative ma...

Read more >