Looking Glass Cyber Logo
About
LeadershipAdvisory BoardCareers
Solutions
scoutPRIMEscoutTHREATscoutINSPECT
Sectors
Financial ServicesGovernment/Public SectorDefense Industrial BaseEnergy Sector
Blog
Company NewsSecurity CornerStrategic IntelligenceThreat Intelligence Insights
Resources
Case StudiesData SheetsEventsInfographicsWhite PapersVideosKnowledge Base
Contact
Digital,crime,by,an,anonymous,hacker

Security Corner

Looking Glass' Security Corner Blog Archives, informational blog posts featuring key insights and takeaways from the Cybersecurity Industry

  1. Home
  2. Blog
  3. Security Corner

Categories

  • News (258)
  • Security Corner (80)
  • Strategic Intelligence (2)
  • Threat Intelligence Insights (211)
October 10, 2018
Footer background image

Bridging The Cybersecurity Skills Gap

The cybersecurity industry is in a crisis. The cost of a data breach hit a whopping $3.86 million (a 6.4% increase from 2017), cybersecurity is considered one of the top four threats to business growth, and “mega breaches” (where 1 to 50 million records are lost) are becoming a weekly occurrence. The solution seems easy […]

Read more >
September 13, 2018
Footer background image

Anomalies in Cyber Threat Intelligence

We often use anomaly detection to identify potential malicious activity within our organizations, with the data of choice being network telemetry obtained from firewalls and intrusion detection systems, as well as system and application logs. However, anomaly detection has much greater uses, such as identifying how the broader threat environment is changing. This activity provides […]

Read more >
August 22, 2018
Footer background image

The Importance of Connected Data in Threat Intelligence

One of the biggest challenges threat analysts face today is assessing the validity of threat intelligence feeds. Many of those threat intelligence feeds contribute to a large amount of atomic data that is often difficult to relate and correlate in meaningful ways; therefore, it is difficult to determine the relevancy of a threat to the […]

Read more >
July 25, 2018
Footer background image

How to Improve Your Cyber Threat Intelligence Automation

The cybersecurity industry is developing more in cyber threat intelligence automation. See our 3 key insights into where you can focus improvement efforts..

Read more >
July 18, 2018
Footer background image

Protection via Deception: How Honeypots Confuse – and Defeat – Hackers

To tweak a traditional saying, you can do a better job catching flies with honey than vinegar. In this case, I’m talking about the “honeypot,” set up to catch the hacker “fly.” To summarize and elaborate upon various definitions over the years, honeypots are computer systems that lure attackers by simulating real systems within a […]

Read more >
June 12, 2018
Footer background image

Challenging the Economics of Cybersecurity with Cyber Threat Intelligence-Sharing Programs: Part 2

In the first part of this series, I defined cyber threat intelligence sharing and how it can benefit your organization, as well as between organizations. In Part 2, we will review the good and bad of threat intelligence-sharing programs and suggest some solutions. When Does Intelligence Sharing Work? Cyber threat intelligence-sharing communities have experienced varying […]

Read more >
May 23, 2018
Footer background image

Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Defending your organization from cyber-attacks is a daunting challenge when the economics of cybersecurity favors the attacker. For an organization, success means thwarting each and every attack attempt while the attacker only needs one win. The money and data obtained from a breach is valued at only a fraction of the cost that your organization […]

Read more >
April 30, 2018
Footer background image

Why Cyber Response Mechanisms Must Talk to Each Other… part 2

In part 1 of this blog series I highlighted why organizations require independent cyber security systems that can be combined in a collaborative manner to provide more effective threat response. In this week’s final installment of the series, I will answer a key question: How do organizations ensure they are either developing or leveraging technologies […]

Read more >
April 11, 2018
Footer background image

Why Cyber Response Mechanisms Must Talk to Each Other…

As I was preparing to write this blog on the importance of interoperability across cyber defense systems, I read the following news article “Why America’s Two Best Fighter Jets Can’t Talk to Each Other”. One of the salient points in this article is that reportedly the communication systems in the newer model fighter jet is […]

Read more >
<45678>
Footer background image
About
LeadershipAdvisory BoardCareers
Solutions
scoutPRIMEscoutTHREATscoutINSPECT
Sectors
Financial ServicesGovernment/Public SectorDefense Industrial BaseEnergy Sector
Blog
Company NewsSecurity CornerStrategic IntelligenceThreat Intelligence Insights
Resources
Case StudiesData SheetsEventsInfographicsWhite PapersVideosKnowledge Base
Contact
© Copyright 2023 LookingGlass Cyber Solutions, Inc ™. All rights reserved. Terms of Use. Privacy Policy
Facebook Link
Twitter Link
LinkedIn Link
YouTube Link