Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Intelligence

The evolution of threat intelligence platforms with Greg Martin

In a 'Defender Fridays' live session, Greg Martin, CEO of Ghost Security, revisited the early days of Anomali (formerly ThreatStream), emphasizing its pivotal role in threat intelligence platform (TIP) evolution. He shared the importance of meticulously managing and validating Indicators of Compromise (IoCs) to maintain their relevance and impact, advocating for a blend of automation and manual oversight to keep threat intelligence agile and effective.

Exploring Cybersecurity in the Financial Sector: The Role of DORA and ThreatQ

As the Principal Threat Intelligence Services Engineer and Trainer at ThreatQuotient, my role puts me in front of a diverse range of clients and partners across various industries, offering me a unique perspective on the impact of regulatory frameworks on cybersecurity. Through our European Union (EU) based clients and partners, I have seen the emergence of the need to be compliant with the Digital Operational Resilience Act (DORA).

How security teams manage threat intelligence with Tines

Every day, the growing threat landscape presents new challenges for security teams, with threats becoming more diverse and complex. But while teams typically have the tools to gather the intelligence they need, they often run into trouble with the next steps in the process - enriching, prioritizing and responding to this intel.

What Is Cyber Threat Analysis? Is It Important?

Cyberthreat analysis is the process of identifying, assessing, and understanding potential threats to an organisation's information systems and network. It involves defining the scope of the analysis, implementing relevant policies and procedures, and gathering data to assess and mitigate potential risks.

ConnectWise Vulnerability: Authentication Bypass in ScreenConnect

Widespread exploitation of these vulnerabilities in the wild has been confirmed including comprise of UnitedHealth’s Change Healthcare on February 22nd, by Lockbit. Sophos has confirmed various strains of malware using these vulnerabilities as part of delivery including LockBit ransomware, AsyncRAT, infostealers, etc.

CrowdStrike 2024 Global Threat Report: Adversaries Gain Speed and Stealth

The CrowdStrike Global Threat Report, now in its tenth iteration, examines how adversaries’ behavior poses an ever-expanding risk to the security of organizations’ data and infrastructure. Armed with this critical information, organizations are better equipped to face evolving threats. Stealth was the pervading theme of the 2023 threat landscape.

Leveraging ThreatQ and Infoblox SOC Insights for Enhanced Security Operations

Organizations face an ever-evolving array of cyber threats that require swift and intelligent responses. Security Operations Centers (SOCs) are at the forefront of this battle, tasked with detecting, analyzing, and mitigating threats to safeguard valuable assets. To bolster their defenses, many enterprises are turning to innovative solutions such as ThreatQ™ and Infoblox SOC Insights, which offer advanced capabilities for threat intelligence management and network security.