Cyber Threat Intelligence: Lack of Training, Tools, Oversight

New research cites a lack of training, tools, and oversight for cyber threat intelligence analysts. How to leverage CTI without exposing your organization:
The post Cyber Threat Intelligence: Lack of Training, Tools, Oversight appeared first on Securit… Continue reading Cyber Threat Intelligence: Lack of Training, Tools, Oversight

What’s Next in Cyber Threat Intelligence?

Video: Jake Williams (SANS & Rendition InfoSec) shares his thoughts about the future of Cyber Threat Intelligence (CTI) and OSINT collection. (Authentic8)
The post What’s Next in Cyber Threat Intelligence? appeared first on Security Boulevard.
Continue reading What’s Next in Cyber Threat Intelligence?

Cyber Threat Intelligence: How to Use OSINT

Video: What organizations benefit from formal Cyber Threat Intelligence (CTI) and Open Source Intelligence (OSINT) programs? What’s the recommended playbook?
The post Cyber Threat Intelligence: How to Use OSINT appeared first on Security Boulevard.
Continue reading Cyber Threat Intelligence: How to Use OSINT

How OSINT Benefits Cyber Threat Intelligence

We asked cyber threat intelligence veteran Jake Williams, SANS instructor and president/founder of Rendition Infosec, in this video. (Authentic8 Blog)
The post How OSINT Benefits Cyber Threat Intelligence appeared first on Security Boulevard.
Continue reading How OSINT Benefits Cyber Threat Intelligence

Authentic8 Completes FedRAMP ‘In Process’ Authorization Milestone

Authentic8, maker of Silo, the leading web isolation platform for commercial and government organizations, is now ‘In Process’ for FedRAMP authorization.
The post Authentic8 Completes FedRAMP ‘In Process’ Authorization Milestone appeared first on Secur… Continue reading Authentic8 Completes FedRAMP ‘In Process’ Authorization Milestone

How to REALLY Browse Anonymously

When anonymous web access becomes business-critical, the web’s favorite home remedies won’t help. Worse, some methods and browser plugins will actually harm your organization.
The post How to REALLY Browse Anonymously appeared first on Security Bouleva… Continue reading How to REALLY Browse Anonymously

10 Top Tools for Threat Hunters from Black Hat USA 2019

Ten short reviews of useful tools for OSINT analysts and threat hunters presented at Black Hat USA 2018 for pentesting, forensics, online investigations, phishing simulation, and more.
The post 10 Top Tools for Threat Hunters from Black Hat USA 2019 ap… Continue reading 10 Top Tools for Threat Hunters from Black Hat USA 2019