Cybersecurity Blog: The Cyber Scene is evolving, are you?

One of the most compelling questions asked today by security operations is, “Can we enable our analysts to make security decisions that will have a positive impact on the overall security posture of our organization?” The short answer is, “Yes. But it’s not easy.”

Read more

Enterprise security leaders are faced with a dilemma. Missing just one attack can result in a catastrophic data breach. Forced to defend their enterprise with strained resources, limited intelligence and an excess of security threats, companies need a new approach to cybersecurity that focuses on getting the most out of their available resources.

Following our webinar with guest speaker Forrester Senior Analyst, Joseph Blankenship, we asked him to address some of the questions from the audience around the challenges organizations face as they look to enhance their cybersecurity programs. Below are his responses.

Read more

As previously discussed (TIP Defined blog post), a properly employed Threat Intelligence Platform can enable an organization to take a more effective approach to computer network defense. In this post we will delve a bit deeper into how a Threat Intelligence Platform (TIP) can act as a tool for incident response and investigations, becoming a central hub for SOC operations performing with an Intelligence Driven Defense®mindset.

Read more

After reporting that hackers had stolen more than 500 million financial records worldwide in 2014, the director in the FBI’s Cyber Division issued a warning saying, “You’re going to be hacked. Have a plan.” -Heartland Blog

Read more

Arguably one of the most important aspects of cybersecurity is Threat Intelligence. Yet despite its importance, this particular discipline as part of a solid security posture is often underestimated in terms of importance.

The consulting company, Forrester, defines threat intelligence as the details of the motivations, intent and capabilities of internal and external threat actors. Forrester extends their definition of Threat Intelligence to include specifics on the tactics, techniques and procedures that hackers and Advanced Persistent Threats employ within their attacks. - Threat Intelligence Buyer’s Guide SANS CTI Summit, 10 February 2014.

Read more