How Relevance Scoring Can Make Your Threat Intelligence More Actionable

As businesses around the world become more global, the volume and complexity of attacks continue to grow. Protecting a company

Read more

Recalibrate Insider Threat Controls When Your Employees Are Off the Corporate Network

In recent years, remote work has become a growing trend. In 2018, however, only 3.6 percent of Americans worked entirely

Read more

Grow Your Business With an Evolving Cloud Security Strategy

We have all heard the castle-and-moat analogy to describe traditional centralized approaches to cybersecurity. As cloud security becomes increasingly important

Read more

Leverage ATT&CK for ICS to Secure Industrial Control Systems

Not too many of us have directly experienced the unavailability of a critical service or infrastructure (e.g., power outages, unavailability

Read more

A Guide to Easy and Effective Threat Modeling

Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s

Read more

The Past, Present and Future of Security Information and Event Management (SIEM)

With the release of the 2020 Gartner Magic Quadrant for Security Information and Event Management (SIEM), we feel that it

Read more

Increase Automation to Overcome Cyber Resilience Challenges

Security operations teams face an exponentially growing volume of security event data while resources mostly remain static. One great way

Read more

How to Create Value With Your (Security) Data Analytics Program

I have been fascinated by data analytics for all my professional life — from my early days of using Linux

Read more

The Case for Integrating Dark Web Intelligence Into Your Daily Operations

Some of the best intelligence an operator or decision-maker can obtain comes straight from the belly of the beast. That’s

Read more