threat-intelligence-insights

DEF CON 2014 Wrap-Up

By Andrew Sharetts Another DEF CON has come and gone, and with the public’s increased awareness ...

Navigating the Threat Intelligence Hype

Having returned from Black Hat USA 2014 it has become apparent that threat intelligence is nearing ...
threat-intelligence-insights

Conficker May Not be a Risk…But its Host is!

My recent blog post on infections on the CHS network generated a lot of questions and criticism.
threat-intelligence-insights

Gamers Go Offline Over Weekend as Massive DDoS Attacks Hit Sony PlayStation

Over the weekend, the gaming world was hit by a series of Distributed Denial of Service (DDoS) ...
threat-intelligence-insights

Where there are Breaches, there are Infections

Community Health Systems (CHS) recently announced their network of 206 Hospitals was hacked ...
threat-intelligence-insights

Beyond Buzzwords (Part II): Concrete Steps to Deploying an Effective Threat Intelligence Capability

A few days ago, we told you about a recent webinar on Defining Threat Intelligence, hosted by our ...
threat-intelligence-insights

A Difficult New DNS DDoS Attack

More and more DNS administrators know that attackers can use reflection or request open recursive ...
threat-intelligence-insights

Beyond Buzzwords: Defining Threat Intelligence and Why It Matters

Eric Olson, Cyveillance’s Vice President of Product Strategy, recently hosted an online webinar ...