threat intelligence (7)

CISO Breach & AI Threat Intelligence Report

  • For NAM CISOs and security leaders walking into the office this morning
  • Coverage window: incidents and vulnerabilities surfaced in roughly the last 24 hours (US & Canada-first, with global items that mater
Read more…

CISO Breach & AI Threat Intelligence Report

  • For NAM CISOs and security leaders walking into the office this morning
  • Coverage window: incidents and vulnerabilities surfaced in roughly the last 24 hours (US & Canada–first, with global items that mater
Read more…

The power of signals, or indicators, is evident to those who understand them. They are the basis for identity risk intelligence and it’s role in disinformation security. For years, cybersecurity teams have anchored their defenses on Indicators of Com

Read more…

Unfortunately, I am old enough to remember how SIEM was done before the arrival of threat intelligence feeds. We had to write broad behavioral (well, “behavioral-ish”, if I am totally honest) rules without relying on any precise knowledge of attacker

Read more…

Join The Community Discussion