Blog Trendsincybermit Header Graphic

Trends in Cyber Threat Mitigation and Deception Technologies

So many alerts, so little time: It’s a common refrain among security analysts, who might see up ...
Rethinkingnetworkdefense Blog Header Graphic

Rethinking Network Defense

For all the money pouring into the cybersecurity industry, here’s an honest summary of the ...
Protectingorgblog Header Graphic

Protecting Organizations with Integrated Client + Network Cybersecurity

Today’s security defenders are tasked with the challenge of detecting – and mitigating – ...
Threatmodelingattackingblog Header Graphic

Threat Modeling: ATT&CK-ing Risk Management

In May, LookingGlass wrote about the benefits of threat modeling – specifically emphasizing its ...
Fabricblog Header Graphic

Solving Today’s Cybersecurity Challenges with a Cybersecurity Fabric

The introduction of the cloud, mobility, and Internet of Things (IoT) means organizations are ...
Energysectorblog Header Graphic

Afraid of the Dark: Cyber Threats to the Energy Sector (Part Two)

In the second installment of this series, we explore the different attack vectors used against the ...
Energysectorblog Header Graphic

Afraid of the Dark: Cyber Threats to the Energy Sector (Part One)

In the first installment of this series, we will explore the different threat actor groups that ...
Zeekblog Header Graphic

Zeek-Based Security Detection & Mitigation

Today, there are many open-source software projects that provide incredible value to solving a ...
Blog Healthcare Stop Data Breaches Header Compressor

It’s a Beautiful Day to Stop Breaches

The Healthcare industry is in a cyber crisis; health organizations are aware of the issues, but are ...
Blog Threatmodeling2 Header Compressor

Modeling Business Risk to Advanced Persistent Threats

Advanced persistent threats (APT) are known as one of the most stealthy and sophisticated ...