Five Steps to Turn Threat Intelligence into a Threat Operations Program

Last month at the Gartner Security and Risk Management conference, I had the opportunity to speak with many CISOs, analysts and other security professionals. One of the common threads through many of these conversations was how to use threat intelligen… Continue reading Five Steps to Turn Threat Intelligence into a Threat Operations Program

An Intelligent Approach to Cure Security Fatigue

Late last year, a study by the US National Institute of Standards and Technology (NIST) took an in-depth look at a phenomenon called “security fatigue.” Researchers found that a majority of individuals they interviewed (20 to 60 year olds in a variety of jobs and in rural, urban and suburban environments) experience a weariness or reluctance to deal with computer security.

read more

Continue reading An Intelligent Approach to Cure Security Fatigue

Use Threat Intelligence to “Unfragment” Security

My good friend and (full disclosure) ThreatQuotient Board member, Marty Roesch, once said in a meeting, “Complexity is the enemy of security.” Not sure if he was the first to say it or was quoting someone else, but it stuck with me. It is a simple statement and one that is proven true time and time again.

read more

Continue reading Use Threat Intelligence to “Unfragment” Security

Defense-in-Depth has Failed Us. Now What?

Defense-in-depth. It’s a philosophy we’re all familiar with: layering defenses so that if one fails, another layer is there to stop the attack. Sounds like a great approach, and it has become standard practice for the vast majority. The problem is that, frankly, it has not worked. For years we have been bombarded with a slew of headlines about compromises and breaches.

read more

Continue reading Defense-in-Depth has Failed Us. Now What?

Your Threat Intelligence Has a Shelf Life

Smart refrigerators can monitor your food and alert you when it is about to expire. There are apps that do this as well, keeping track of food freshness using a database to predict expiration dates. These are great ways to help make sure you use food before it goes bad, and avoid getting sick by consuming something that’s past its shelf life.  

read more

Continue reading Your Threat Intelligence Has a Shelf Life

Boosting Your Threat IQ with Context

Computing pioneer Alan Kay once said, “Context is worth 80 IQ points.”  On the IQ scale, where average is about 100 and Einstein is 160+, context could propel you into the genius category pretty handily. For cybersecurity professionals who know that the industry has no shortage of threat data, context is the lever that turns threat data into threat intelligence.

read more

Continue reading Boosting Your Threat IQ with Context