Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Challenging the Economics of Cybersecurity with Cyber Threat Intelligence-Sharing Programs: Part 2

In the first part of this series, I defined cyber threat intelligence sharing and how it can ...
Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Defending your organization from cyber-attacks is a daunting challenge when the economics of ...
tech-corner

Why Cyber Response Mechanisms Must Talk to Each Other… part 2

In part 1 of this blog series I highlighted why organizations require independent cyber security ...

Why Cyber Response Mechanisms Must Talk to Each Other…

As I was preparing to write this blog on the importance of interoperability across cyber defense ...

DDE Exploitation – Macros Aren’t the Only Thing You Should be Counting

Exploitation of the Microsoft® Dynamic Data Exchange (DDE) protocol is increasingly being used to ...

The Role of Machine Learning in Intelligent Threat Response

Machine learning, or artificial intelligence (AI), is the most recent buzzword making its way ...

Cyber Threat Scoring is not Risk Assessment

Companies face such a large and diverse cyber threat landscape, it seems almost impossible to ...

Down the BadRabbit Hole: Ransomware Delivered by Fake Flash Updates

In the past few weeks, a new strain of self-propagating ransomware dubbed BadRabbit emerged via ...
tech-corner

Moving Beyond Threat Hunting to Actively Counter Threats

For those of you building proactive cybersecurity programs, this blog will cover some tips that I ...

4 Easy Ways to Avoid Being a Victim of Clickjacking

Clickjacking, also known as a "UI Redress Attack,” is a tricky method of getting a user to click ...