September 05, 2017
Footer background image

So You Want to Implement a Threat Intelligence Program? Here’s How to Build One Successfully

In many respects, Threat Intelligence (TI) programs are still in their infancy, and security professionals are still struggling to put these programs together. To help security professionals, who strive to build successful TI programs, I recently held a webinar series, “Success Factors in Threat Intelligence” that described a comprehensive business technical approach to the justification, definition, design, and execution of TI programs.

Read more >
March 09, 2017
Footer background image

CTO Corner: Threat Correlation Techniques for Assessing Targeted Attacks (Part 2)

In our last blog, Chief Technology Officer Allan Thomson and Principal Data Scientist Dr. Jamison Day discussed threat intelligence and security telemetry for assessing targeting attacks. Today, they delve into different threat correlation techniques security professionals can use to assess targeted attacks. Threat correlation identifies new cyber threat insights by associating events from multiple data sources. […]

Read more >
February 23, 2017
Footer background image

CTO Corner: Threat Intelligence and Security Telemetry for Assessing Targeted Attacks (Part 1)

The current number of active cyber threats is astounding. If your organization is like most, your cyber security team doesn’t have the capacity to manually detect, monitor, and defend against all of today’s known threats. Effective cyber threat management requires leveraging automation to inform decisions about when and where to take action. Typically, threats that […]

Read more >
February 01, 2017
Footer background image

Need a Real-Time Threat Killer? The Automated Threat Intelligence Gateway to the Rescue

The cyber landscape is constantly evolving, and in turn, security products need to evolve with it. One of the most common questions cyber security professionals have is how to stop real-time threats with the limited resources at their disposal. There is a cost for tools, processes and manpower. As CISOs and VPs of Security Operations […]

Read more >
January 19, 2017
Footer background image

CTO Corner: Improving Security Analytics Effectiveness to Leverage Threat Intelligence…and other FloCon 2017 lessons

Last week, I attended the 13th annual FloCon 2017 in San Diego, CA, an event focused on large-scale network analytics. This year’s theme was ‘Flow and Beyond’ and presentations focused on enhancing incident detection and network situational awareness. On this note, my colleague Dr Jamison Day and I focused our talk on Assessing Targeted Attacks […]

Read more >
May 12, 2016

Introducing scoutPRIME®, Part 3 – Threat Defense Operationalization

This blog series explores three fundamental challenges our customers have when leveraging a Threat Intelligence Platform (TIP). In this blog, we discuss the last challenge of operationalizing threat defense. The TIP has become a critical part of any mature security operation environment, where threat analysis and relevant threat intelligence can drive the actions of other […]

Read more >