Tips to Big Data Use in Cybersecurity Operations

Tips to Big Data Use in Cybersecurity Operations

The term Big Data is often misused or used to represent many different concepts depending on who ...
anomaly-detection-cyber-threat-intelligence

Anomalies in Cyber Threat Intelligence

We often use anomaly detection to identify potential malicious activity within our organizations, ...
The Importance of Connected Data in Threat Intelligence

The Importance of Connected Data in Threat Intelligence

One of the biggest challenges threat analysts face today is assessing the validity of threat ...
How to Improve CTI Automation

How to Improve Your Cyber Threat Intelligence Automation

Do any of these quotes resonate with you? “If CTI vendors would provide more context to their ...
Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Challenging the Economics of Cybersecurity with Cyber Threat Intelligence-Sharing Programs: Part 2

In the first part of this series, I defined cyber threat intelligence sharing and how it can ...
Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Defending your organization from cyber-attacks is a daunting challenge when the economics of ...
tech-corner

Why Cyber Response Mechanisms Must Talk to Each Other… part 2

In part 1 of this blog series I highlighted why organizations require independent cyber security ...
LookingGlass Announces ScoutPrime Webinar

Why Cyber Response Mechanisms Must Talk to Each Other…

As I was preparing to write this blog on the importance of interoperability across cyber defense ...
DDE Exploitation – Macros Aren’t the Only Thing You Should be Counting Blog Header

DDE Exploitation – Macros Aren’t the Only Thing You Should be Counting

Exploitation of the Microsoft® Dynamic Data Exchange (DDE) protocol is increasingly being used to ...
LGMKT-161 Machine_Learn_Webinar HDR 1280x608_R1C

The Role of Machine Learning in Intelligent Threat Response

Machine learning, or artificial intelligence (AI), is the most recent buzzword making its way ...