Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1

Defending your organization from cyber-attacks is a daunting challenge when the economics of ...
tech-corner

Why Cyber Response Mechanisms Must Talk to Each Other… part 2

In part 1 of this blog series I highlighted why organizations require independent cyber security ...
LookingGlass Announces ScoutPrime Webinar

Why Cyber Response Mechanisms Must Talk to Each Other…

As I was preparing to write this blog on the importance of interoperability across cyber defense ...
DDE Exploitation – Macros Aren’t the Only Thing You Should be Counting Blog Header

DDE Exploitation – Macros Aren’t the Only Thing You Should be Counting

Exploitation of the Microsoft® Dynamic Data Exchange (DDE) protocol is increasingly being used to ...
Camoflauge and Threat Mitigation Blog Header

Camouflage & Deception: A New Approach to Threat Mitigation

Organizations are faced with threats that range from annoyances to more sophisticated threats ...
LGMKT-161 Machine_Learn_Webinar HDR 1280x608_R1C

The Role of Machine Learning in Intelligent Threat Response

Machine learning, or artificial intelligence (AI), is the most recent buzzword making its way ...
Cyber-Threat-Scoring-is-not-Risk-Assessment_Blog-Header

Cyber Threat Scoring is not Risk Assessment

Companies face such a large and diverse cyber threat landscape, it seems almost impossible to ...
Bad-Rabbit-Blog-Header-1280x608

Down the BadRabbit Hole: Ransomware Delivered by Fake Flash Updates

In the past few weeks, a new strain of self-propagating ransomware dubbed BadRabbit emerged via ...
tech-corner

Moving Beyond Threat Hunting to Actively Counter Threats

For those of you building proactive cybersecurity programs, this blog will cover some tips that I ...
4-Easy-Ways-to-Avoid-Being-a-Victim-of-Clickjacking-Blog-Header-1280x608

4 Easy Ways to Avoid Being a Victim of Clickjacking

Clickjacking, also known as a "UI Redress Attack,” is a tricky method of getting a user to click ...