Cyber Threat Intelligence Uses,Successes and Failures: The SANS 2017 CTI Survey
Posted March 16, 2017
SANS | By Dave Shackleford
Over the past year, Yahoo revealed the largest data breaches in history,and nation-state hacking activity was suspected in tampering with the U.S. presidential election. More...
Read More >
White Paper: SANS 2016 Analytics and Intelligence Survey
Posted December 14, 2016
Based upon the 2015 survey results, SANS concluded that “results seem to indicate slow and steady progress but also underscore a significant lack of maturity...
How to Deal With the Cyber Kill Chain
Posted November 29, 2016
CIO Insight | By Karen A. Frenkel
In the quest to stay ahead of cyber-threats, many cyber-security teams have turned to a well-understood military concept, the kill chain, which details how adversaries...
View All White Papers, Articles & Research Reports >>>
STIX and TAXII: Sharing cyber threat intelligence
Posted August 15, 2017
LookingGlass | By Allan Thomson
"STIX and TAXII: Sharing cyber threat intelligence" from Black Hat USA 2017 by Allan Thomson, LookingGlass....
Are Your Third Parties a Ticking Time Bomb?
Posted July 14, 2017
Are Your Third Parties a Ticking Time Bomb? Outsourcing and strategic partnerships are a staple in today's business climate, enabling organizations to drive business value...
Don’t Believe the Hype: The Dark Web is just another source for intelligence
Posted July 5, 2017
Wednesday, August 30th, 2017 | 2pm ET Speakers: Eric Olson, VP of Intelligence Operations, James Carnall, VP of Cyber Security Center The media, prime time...
View All Videos, Webcasts & Podcasts >>>
Supplier Cyber Attack Surface Analysis
Posted April 6, 2017
The LookingGlass™ Supplier Cyber Attack Surface Analysis provides organizations with a detailed, measurable way to examine their third party vendors’ security posture across five categories...
Corporate Cyber Attack Surface Analysis
The LookingGlass™ Corporate Cyber Attack Surface Analysis provides organizations with a detailed, measurable way to examine their internal security posture across five categories of cyber...
Compromised Information Monitoring
Posted March 23, 2017
LookingGlass Compromised Information Monitoring (CIM) provides early warning of compromised account credentials, compromised credit card numbers and compromised Social Security Numbers discovered in the wild....
View All Datasheets & Tech Notes >>>
DNS Bot Attacks and White-listing
Posted April 19, 2016
While protocol-specific protection solutions for DNS recently became widely visible with the rise of solutions from large IP address management (IPAM)1 vendors, CloudShield DNS Defender™...
Uncovering and Stopping the Effects of a DoS Bot Attack
Wind Telecomunicazioni SpA (Wind Italy) is the third largest telecommunications service provider in Italy servicing millions of customers. Near the end of 2013, the Wind...
How Lighttower Fought a DNS Botnet Attack
In late 2013, network engineers at Lightower Fiber Networks began noticing a performance pattern. Some of their DNS servers were carrying high processing loads at...
View All Case Studies >>>