threat-intelligence-insights

DEF CON 2014 Wrap-Up

By Andrew Sharetts Another DEF CON has come and gone, and with the public’s increased awareness ...
Screen Shot 2015-08-05 at 4.39.14 PM

Navigating the Threat Intelligence Hype

Having returned from Black Hat USA 2014 it has become apparent that threat intelligence is nearing ...
threat-intelligence-insights

Conficker May Not be a Risk…But its Host is!

My recent blog post on infections on the CHS network generated a lot of questions and criticism.
threat-intelligence-insights

Gamers Go Offline Over Weekend as Massive DDoS Attacks Hit Sony PlayStation

Over the weekend, the gaming world was hit by a series of Distributed Denial of Service (DDoS) ...
threat-intelligence-insights

Where there are Breaches, there are Infections

Community Health Systems (CHS) recently announced their network of 206 Hospitals was hacked ...
threat-intelligence-insights

Beyond Buzzwords (Part II): Concrete Steps to Deploying an Effective Threat Intelligence Capability

A few days ago, we told you about a recent webinar on Defining Threat Intelligence, hosted by our ...
threat-intelligence-insights

A Difficult New DNS DDoS Attack

More and more DNS administrators know that attackers can use reflection or request open recursive ...
threat-intelligence-insights

Beyond Buzzwords: Defining Threat Intelligence and Why It Matters

Eric Olson, Cyveillance’s Vice President of Product Strategy, recently hosted an online webinar ...