4 Easy Ways to Avoid Being a Victim of Clickjacking

Clickjacking, also known as a "UI Redress Attack,” is a tricky method of getting a user to click ...
how-to-thwart-a-rainbow-table-attack

How to Thwart a Rainbow Table Attack

We all know that a strong password is a necessary first step for good cyber hygiene. However, in ...
So You Want to Implement a Threat Intelligence Program? Here’s How to Build One Successfully

So You Want to Implement a Threat Intelligence Program? Here’s How to Build One Successfully

In many respects, Threat Intelligence (TI) programs are still in their infancy, and security ...
Polarity -  LookingGlass ScoutPrime Integration

Polarity & LookingGlass ScoutPrime Integration

In collaboration with LookingGlass, Polarity developed a real-time integration to the LookingGlass ...

CTO Corner: Threat Correlation Techniques for Assessing Targeted Attacks (Part 2)

In our last blog, Chief Technology Officer Allan Thomson and Principal Data Scientist Dr. Jamison ...

CTO Corner: Threat Intelligence and Security Telemetry for Assessing Targeted Attacks (Part 1)

The current number of active cyber threats is astounding. If your organization is like most, your ...

Need a Real-Time Threat Killer? The Automated Threat Intelligence Gateway to the Rescue

The cyber landscape is constantly evolving, and in turn, security products need to evolve with it. ...

CTO Corner: Improving Security Analytics Effectiveness to Leverage Threat Intelligence…and other FloCon 2017 lessons

Last week, I attended the 13th annual FloCon 2017 in San Diego, CA, an event focused on large-scale ...

Introducing ScoutPrime, Part 3 – Threat Defense Operationalization

This blog series explores three fundamental challenges our customers have when leveraging a Threat ...

Introducing ScoutPrime, Part 2 – Analysis & Enrichment

In this blog series by CTO Allan Thomson, we are exploring the three fundamental challenges that ...