Cyber Threat Scoring is not Risk Assessment

Companies face such a large and diverse cyber threat landscape, it seems almost impossible to ...

Down the BadRabbit Hole: Ransomware Delivered by Fake Flash Updates

In the past few weeks, a new strain of self-propagating ransomware dubbed BadRabbit emerged via ...
tech-corner

Moving Beyond Threat Hunting to Actively Counter Threats

For those of you building proactive cybersecurity programs, this blog will cover some tips that I ...

4 Easy Ways to Avoid Being a Victim of Clickjacking

Clickjacking, also known as a "UI Redress Attack,” is a tricky method of getting a user to click ...
how-to-thwart-a-rainbow-table-attack

How to Thwart a Rainbow Table Attack

We all know that a strong password is a necessary first step for good cyber hygiene. However, in ...
So You Want to Implement a Threat Intelligence Program? Here’s How to Build One Successfully

So You Want to Implement a Threat Intelligence Program? Here’s How to Build One Successfully

In many respects, Threat Intelligence (TI) programs are still in their infancy, and security ...
Polarity -  LookingGlass ScoutPrime Integration

Polarity & LookingGlass ScoutPrime Integration

In collaboration with LookingGlass, Polarity developed a real-time integration to the LookingGlass ...

CTO Corner: Threat Correlation Techniques for Assessing Targeted Attacks (Part 2)

In our last blog, Chief Technology Officer Allan Thomson and Principal Data Scientist Dr. Jamison ...

CTO Corner: Threat Intelligence and Security Telemetry for Assessing Targeted Attacks (Part 1)

The current number of active cyber threats is astounding. If your organization is like most, your ...

Need a Real-Time Threat Killer? The Automated Threat Intelligence Gateway to the Rescue

The cyber landscape is constantly evolving, and in turn, security products need to evolve with it. ...