Threat intelligence News
January 09, 2018
Federal agencies opened public comments on a draft botnet security report born from the 2017 White House cybersecurity executive order, and experts are generally favorable.
December 20, 2017
The White House's WannaCry attribution included the broad strokes, experts say, but the case avoided some key pieces of information, such as the role of the NSA in the attacks.
November 02, 2017
Two senators introduced a bipartisan election security bill called the SAVE Act, which aims to improve voting infrastructure and harden state systems against attack.
October 19, 2017
Cloud, datacentre and communications software company Node4 has sauced up its security portfolio with a series of upgrades and new security services under the banner of SECaaS (Security as a ...
Threat intelligence Get Started
Bring yourself up to speed with our introductory content
The failure to detect insider threats and a growing need to store and sort through massive amounts of data have drawn attention to user behavior analytics, sometimes called user and entity behavior analytics. According to Gartner, UBA tools deliver value for use cases such as compromised accounts, including stolen and phished credentials. They can also be used to find compromised systems and data exfiltration.
Security platforms like data loss prevention, endpoint security and cloud access security brokers will increasingly layer or incorporate UBA features to help analyze alerts and make underlying technology more useful, according to analysts. SIEM and UBA are also converging, with SIEM vendors adding UBA tools and UBA vendors building SIEM systems.
In this issue of Information Security magazine, we look at the dynamics around UBA and strategies for CISOs going forward. UBA vendors are releasing product suites targeted at security operations centers, today built around SIEM. What does the future hold for standalone UBA tools? We look at time to value and use cases, and help you sift through the noise.Continue Reading
The use of a cyber threat intelligence team can greatly help organizations. Learn the best practices for team location and selection from expert Robert M. Lee. Continue Reading
Expert contributor Ed Tittel takes a look at Trend Micro OfficeScan, an endpoint protection product with antivirus and antimalware functionality for physical and virtualized endpoints. Continue Reading
Evaluate Threat intelligence Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The Windows 10 Fall Creators Update took Windows 10 security up a notch by adding advanced features to Windows Defender, including Application Guard and Exploit Guard. Continue Reading
Explore the top things you should know about real-time analytics with Johna Till Johnson and learn how it reduces false positives detected in your system on a daily basis. Continue Reading
In this excerpt from chapter 1 of Threat Forecasting, authors John Pirc, David DeSanto, Iain Davison, and Will Gragido discuss how to navigate today's threat landscape. Continue Reading
Manage Threat intelligence
Learn to apply best practices and optimize your operations.
Hivenets, an emerging type IoT attack using swarm technology, are changing the game for cybercriminals. Here's how organizations should plan and respond. Continue Reading
Phishing attacks, clicking on malicious links and visiting malicious sites is a problem for hospital network security. One health system uses Cisco Umbrella to solve this problem. Continue Reading
Expert contributor Ed Tittel explains which types of organizations need threat intelligence tools as part of a proactive, layered security strategy to protect against threats. Continue Reading
Problem Solve Threat intelligence Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A botnet-based local file inclusion attack targeted IBM X-Force customers. Expert Judith Myerson explains how these attacks work and how enterprises can defend against them. Continue Reading
In an era of security app sprawl, a unified security management framework could be the best way to corral security tools and ensure network integrity. Continue Reading
Why nation-state attribution plays a major role in the U.S. government's willingness to share cyberthreat intelligence with private-sector companies. Continue Reading