threat-intelligence-insights

Turning Data into Threat Intelligence: A Case Study

Eric Olson, Cyveillance’s Vice President of Product Strategy, recently hosted a webinar on ...
threat-intelligence-insights

Why Big Banks Are Cracking Down on Law Firm Security Gaps

    Even before this summer’s spate of breach announcements by some of the country’s ...
threat-intelligence-insights

Cyveillance Weekly Trends Report – October 28, 2014

Welcome to the Cyveillance Weekly Trends Report Since threat intelligence is constantly evolving, ...
threat-intelligence-insights

Snapchat Photo Leak Shines a Light on Vulnerable Third-Party Apps

After a massive photo leak dubbed “The Snappening” exposed an estimated 200,000 images from ...
threat-intelligence-insights

Scam of the Day – Airline Ticket Notification Malware Continues to Spread

Loyal blog readers may remember the airline ticket notification malware scam we warned of last ...
threat-intelligence-insights

Cyveillance Weekly Trends Report – October 21, 2014

Welcome to the Cyveillance Weekly Trends Report Since threat intelligence is constantly evolving, ...
threat-intelligence-insights

SMBs and DDoS Compliance: What You Need to Know

    October is National Cyber Security Awareness Month, and the last week is focused on ...
threat-intelligence-insights

Three Tools Every Security Analyst Needs

Open source intelligence – or OSINT – is an indispensable part of any robust security plan. The ...
threat-intelligence-insights

Cyveillance Weekly Trends Report – October 14, 2014

Welcome to the Cyveillance Weekly Trends Report Since threat intelligence is constantly evolving, ...

Did stealing small business data motivate JPMorgan hackers?

Did stealing small business data motivate JPMorgan hackers? President Obama can only guess at ...