CACAO

CACAO: A Future for Collaborative Cybersecurity Course of Action

Today, threat actors are increasingly successful at utilizing automation to execute their attacks. ...
Header

Insights on Building Scalable Cybersecurity Systems

Today, enterprises are faced with a plethora of network security solutions attempting to address ...
Tips to Big Data Use in Cybersecurity Operations

Tips to Big Data Use in Cybersecurity Operations

The term Big Data is often misused or used to represent many different concepts depending on who ...
anomaly-detection-cyber-threat-intelligence

Anomalies in Cyber Threat Intelligence

We often use anomaly detection to identify potential malicious activity within our organizations, ...
The Importance of Connected Data in Threat Intelligence

The Importance of Connected Data in Threat Intelligence

One of the biggest challenges threat analysts face today is assessing the validity of threat ...
How to Improve CTI Automation

How to Improve Your Cyber Threat Intelligence Automation

Do any of these quotes resonate with you? “If CTI vendors would provide more context to their ...
Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Challenging the Economics of Cybersecurity with Cyber Threat Intelligence-Sharing Programs: Part 2

In the first part of this series, I defined cyber threat intelligence sharing and how it can ...
Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Defending your organization from cyber-attacks is a daunting challenge when the economics of ...
tech-corner

Why Cyber Response Mechanisms Must Talk to Each Other… part 2

In part 1 of this blog series I highlighted why organizations require independent cyber security ...