What the Verizon DBIR Says About Threat Intelligence Sharing
Before we get started on Verizon’s 2015 Data Breach Investigations Report (DBIR), let’s address the elephant in the room. I created the DBIR back in 2008 and have led the excellent team that produces...
View ArticleRSA 2015: A Look Back
Our team is back from a successful RSA. We met a lot of friends, old and new, and hope that everyone came by our booth to check out the latest and greatest with ThreatConnect. Some of our highlights...
View ArticleThermo Fisher Scientific Co-Hosts Medical/Healthcare Community Event with...
Attacks on companies in the health and medical industry have been steadily increasing, because this data is lucrative in the hands of both criminals and nation states. Our recent independent research...
View ArticleWhat’s the RSA Conference About, Daddy?
Like many of my infosec brethren and sistren (yep; apparently it’s a word), I leave some sad kids behind every year as I make the annual pilgrimage to the RSA 2015 Conference. This year, my 8 year old...
View ArticleISAC & ISAO Financial Incentives for Sharing Threat Intelligence Emerge
Legislation has been proposed to provide incentives in the form of a tax credit to organizations who share cyber threat intelligence. The Chairman of the Senate Commerce Subcommittee on Consumer...
View ArticleThreat Intelligence Sharing: Empower Your Cyber Defense
I am excited to see threat intelligence sharing is catching on as a way to empower cyber security defenders with timely, relevant, and actionable threat intelligence data. I believe, and I actually...
View ArticleThe Cost of Bad (and Value of Good) Threat Intelligence
written by Andy Pendergast, co-author of the Diamond Model for Intrusion Analysis Earlier this week, Sergio Caltagirone. published an article on his blog, highlighting the cost of bad threat...
View ArticleAdversary Intelligence: Getting Behind the Keyboard
Arguably one of the most controversial subjects in Threat Intelligence currently is the topic of Attribution, or developing Adversary Intelligence. Industry pundits will debate attribution with a...
View ArticleOPM Breach Analysis
Back in February, the ThreatConnect team conducted in-depth independent analysis of the Anthem breach, finding connections to amorphous Chinese APT activity. Although our primary concern at the time...
View ArticleOPM Breach Analysis: Update
As highlighted in our recent webinar with Rick Holland, when there is a security event of great magnitude, organizational leadership will want to know as much as possible about the technical WHAT and...
View ArticleThreat Intelligence and Risk Management: An Introduction
Several of us at ThreatConnect attended the Gartner Security & Risk Management Summit last week, which, conveniently took place right across the river from our home offices. I’m not sure if it’s...
View ArticleThreat Intelligence within the Risk Management Process
This is the second post in a series exploring the relationship of threat intelligence and risk management. If you missed the previous one, wherein I briefly explained why these two should “swipe right”...
View Article