Tech Corner

Anomalies in Cyber Threat Intelligence
September 13, 2018
We often use anomaly detection to identify potential malicious activity within our organizations, ...

The Importance of Connected Data in Threat Intelligence
August 22, 2018
One of the biggest challenges threat analysts face today is assessing the validity of threat ...

How to Improve Your Cyber Threat Intelligence Automation
July 25, 2018
The cybersecurity industry is developing more in cyber threat intelligence automation. See our 3 ...

Challenging the Economics of Cybersecurity with Cyber Threat Intelligence-Sharing Programs: Part 2
June 12, 2018
In the first part of this series, I defined cyber threat intelligence sharing and how it can ...

Challenging the Economics of Cybersecurity with Threat Intelligence Sharing Programs: Part 1
May 23, 2018
Defending your organization from cyber-attacks is a daunting challenge when the economics of ...

Why Cyber Response Mechanisms Must Talk to Each Other… part 2
April 30, 2018
In part 1 of this blog series I highlighted why organizations require independent cyber security ...

Why Cyber Response Mechanisms Must Talk to Each Other…
April 11, 2018
As I was preparing to write this blog on the importance of interoperability across cyber defense ...

DDE Exploitation – Macros Aren’t the Only Thing You Should be Counting
April 5, 2018
Exploitation of the Microsoft® Dynamic Data Exchange (DDE) protocol is increasingly being used to ...

Camouflage & Deception: A New Approach to Threat Mitigation
March 22, 2018
Organizations are faced with threats that range from annoyances to more sophisticated threats ...

The Role of Machine Learning in Intelligent Threat Response
February 21, 2018
Machine learning, or artificial intelligence (AI), is the most recent buzzword making its way ...