Quantcast
Channel: ThreatConnect - Threat Intelligence
Browsing all 32 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

What the Verizon DBIR Says About Threat Intelligence Sharing

Before we get started on Verizon’s 2015 Data Breach Investigations Report (DBIR), let’s address the elephant in the room. I created the DBIR back in 2008 and have led the excellent team that produces...

View Article


Image may be NSFW.
Clik here to view.

RSA 2015: A Look Back

Our team is back from a successful RSA. We met a lot of friends, old and new, and hope that everyone came by our booth to check out the latest and greatest with ThreatConnect. Some of our highlights...

View Article


Thermo Fisher Scientific Co-Hosts Medical/Healthcare Community Event with...

Attacks on companies in the health and medical industry have been steadily increasing, because this data is lucrative in the hands of both criminals and nation states.  Our recent independent research...

View Article

Image may be NSFW.
Clik here to view.

What’s the RSA Conference About, Daddy?

Like many of my infosec brethren and sistren (yep; apparently it’s a word), I leave some sad kids behind every year as I make the annual pilgrimage to the RSA 2015 Conference. This year, my 8 year old...

View Article

Image may be NSFW.
Clik here to view.

ISAC & ISAO Financial Incentives for Sharing Threat Intelligence Emerge

Legislation has been proposed to provide incentives in the form of a tax credit to organizations who share cyber threat intelligence. The Chairman of the Senate Commerce Subcommittee on Consumer...

View Article


Image may be NSFW.
Clik here to view.

Threat Intelligence Sharing: Empower Your Cyber Defense

I am excited to see threat intelligence sharing is catching on as a way to empower cyber security defenders with timely, relevant, and actionable threat intelligence data.  I believe, and I actually...

View Article

The Cost of Bad (and Value of Good) Threat Intelligence

written by Andy Pendergast, co-author of the Diamond Model for Intrusion Analysis Earlier this week, Sergio Caltagirone. published an article on his blog, highlighting the cost of bad threat...

View Article

Image may be NSFW.
Clik here to view.

Adversary Intelligence: Getting Behind the Keyboard

Arguably one of the most controversial subjects in Threat Intelligence currently is the topic of Attribution, or developing Adversary Intelligence. Industry pundits will debate attribution with a...

View Article


Image may be NSFW.
Clik here to view.

OPM Breach Analysis

Back in February, the ThreatConnect team conducted in-depth independent analysis of the Anthem breach, finding connections to amorphous Chinese APT activity. Although our primary concern at the time...

View Article


Image may be NSFW.
Clik here to view.

OPM Breach Analysis: Update

As highlighted in our recent webinar with Rick Holland, when there is a security event of great magnitude, organizational leadership will want to know as much as possible about the technical WHAT and...

View Article

Image may be NSFW.
Clik here to view.

Threat Intelligence and Risk Management: An Introduction

Several of us at ThreatConnect attended the Gartner Security & Risk Management Summit last week, which, conveniently took place right across the river from our home offices. I’m not sure if it’s...

View Article

Image may be NSFW.
Clik here to view.

Threat Intelligence within the Risk Management Process

This is the second post in a series exploring the relationship of threat intelligence and risk management. If you missed the previous one, wherein I briefly explained why these two should “swipe right”...

View Article
Browsing all 32 articles
Browse latest View live


Latest Images