Application of Threat Indicators: A Temporal View
Better outcomes will be achieved when we're applying temporal considerations to threat indicators.
View ArticlePrinciples of Malware Sinkholing
The process of sinkholing is an important tool to have in your arsenal when dealing with emerging threats.
View ArticleThreat Intelligence Is a Two-Way Street
Intelligence analysis should be looked upon as less of a service and more of a partnership.
View ArticleThe Rise of Counterintelligence in Malware Investigations
The key to operationalizing cybersecurity threat intelligence rests in the critical thinking that establishes that a given indicator is, in fact, malicious.
View ArticleThird-Party Risk and Organizational Situational Awareness
A rigorous risk management approach will help organizations understand the potential risks posed by their partners.
View ArticleDrinking from the Malware Fire Hose
Take a staged approach to processing malware in bulk so that scarce and time-limited resources can be prioritized for only those threats that truly require them.
View ArticleBreach Defense Playbook: Assessing Your Cybersecurity Engineering
Is your cybersecurity infrastructure robust enough to defend against future attacks?
View ArticleBreach Defense Playbook: Assessing Your Security Controls
Do you include physical security as part of your cybersecurity risk management plan?
View ArticleBreach Defense Playbook: Hunting For Breach Indicators
Do you proactively hunt for malware on your network, or do you wait for your tools to tell you?
View ArticleBreach Defense Playbook: Reviewing Your Cybersecurity Program (Part 1)
How does your cybersecurity program compare to your industry peers?
View ArticleBreach Defense Playbook: Reviewing Your Cybersecurity Program (Part 2)
Cybersecurity requires a combination of people, process, and technology in a coordinated implementation leveraging a defense-in-depth methodology.
View ArticleBreach Defense Playbook: Open Source Intelligence
Do you know what information out there is putting you at risk?
View ArticleBreach Defense Playbook: Incident Response Readiness (Part 1)
Will your incident response plan work when a real-world situation occurs?
View ArticleBreach Defense Playbook: Incident Response Readiness (Part 2)
Will your incident response plan work when a real-world situation occurs?
View ArticleBreach Defense Playbook: Cybersecurity Governance
Time to leave the island: Integrate cybersecurity into your risk management strategy.
View ArticleApplication of Threat Indicators: A Temporal View
Better outcomes will be achieved when we're applying temporal considerations to threat indicators.
View ArticlePrinciples of Malware Sinkholing
The process of sinkholing is an important tool to have in your arsenal when dealing with emerging threats.
View ArticleThreat Intelligence Is a Two-Way Street
Intelligence analysis should be looked upon as less of a service and more of a partnership.
View Article
More Pages to Explore .....