threat-intelligence-insights

Heartbleed: Raised Consciousness for Other Vulnerabilities

Heartbleed has been a hot topic for the past few weeks. Heartbleed refers to a bug in the ...
threat-intelligence-insights

Cyveillance Research Finds Rampant Instances of Rogue Mobile Apps and Malvertising on Third-Party Storefronts

Although most businesses only authorize their mobile applications to be distributed on legitimate ...
threat-intelligence-insights

Social Media and Regulatory Compliance: Is Your Company Protected?

By Camille Stewart Proofpoint hosted an excellent webinar a few weeks ago on "Tweets, Feeds, & ...
threat-intelligence-insights

Shaping the Threat Intelligence Management Market

There has been significant chatter recently about threat intelligence management – specifically ...
threat-intelligence-insights

Social Media Monitoring and Compliance: Five Best Ways to Navigate Complexity in the Workplace, Part IV

by Tobias Losch, GLEG In this blog series on social media and online monitoring, we'll discuss five ...
threat-intelligence-insights

I Think We’ve Seen This Before… …Why “Incident Intelligence” is Imperative

Lately, customers have been asking me how threat intelligence can enrich their incident response ...
tech-corner

The Heartbleed Bug: Cutting Through the Noise

As a trusted security partner, our phones have been blowing up the past 24 hours with clients ...
threat-intelligence-insights

Social Media Monitoring and Compliance: Five Best Ways to Navigate Complexity in the Workplace, Part III

by Tobias Losch, GLEG In this blog series on social media and online monitoring, we'll discuss five ...
threat-intelligence-insights

Social Media Monitoring and Compliance: Five Best Ways to Navigate Complexity in the Workplace, Part II

by Tobias Losch, GLEG In this blog series on social media and online monitoring, we'll discuss five ...