A Guide to Easy and Effective Threat Modeling

Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s point of view. Learn more about building a threat model.

The post A Guide to Easy and Effective Threat Modeling appeared first on Security Intelligence.

Continue reading A Guide to Easy and Effective Threat Modeling

The Case for Integrating Dark Web Intelligence Into Your Daily Operations

Some of the best intelligence a decision-maker can obtain comes straight from the belly of the beast. That’s why dark web intelligence can be incredibly valuable to your security operations center.

The post The Case for Integrating Dark Web Intelligence Into Your Daily Operations appeared first on Security Intelligence.

Continue reading The Case for Integrating Dark Web Intelligence Into Your Daily Operations

DevOps Chat: A CISO’s Quest for Better Security, With Altitude Networks

Michael Coates is on a mission, a journey, an unassailable quest. You don’t come away from senior security leadership roles at Twitter and Mozilla without some real-world lessons of how to improve cybersecurity. Those lessons inspired our guest … Continue reading DevOps Chat: A CISO’s Quest for Better Security, With Altitude Networks

What Is Security Intelligence? Here’s What Your Business Leaders Want to Know

Reading Time: 3 minutes How do you explain security intelligence to your COO? In today’s heightened threat landscape, where business leaders are reading about breaches in the news every day, it’s crucial to do your homework.

The post What Is Security Intelligence? Here’s What Your Business Leaders Want to Know appeared first on Security Intelligence.

Continue reading What Is Security Intelligence? Here’s What Your Business Leaders Want to Know

The Need For Domain Experts and Non Trivial Conclusions

In my last blog post I highlighted some challenges with a research approach from a paper that was published at IEEE S&P, the sub conference on “Deep Learning and Security Workshop (DLS 2019)“. The same conference featured another paper … Continue reading The Need For Domain Experts and Non Trivial Conclusions

Research is “Skewing up”

Over the weekend I was catching up on some reading and came about the “Deep Learning and Security Workshop (DLS 2019)“. With great interest I browsed through the agenda and read some of the papers / talks, just to find myself quite disappoi… Continue reading Research is “Skewing up”

Causality Research in AI – How Does My Car Make Decisions?

Before even diving into the topic of Causality Research, I need to clarify my use of the term #AI. I am getting sloppy in my definitions and am using AI like everyone else is using it, as a synonym for analytics. In the following, I’ll even use i… Continue reading Causality Research in AI – How Does My Car Make Decisions?

DevOps Chat: Security Intelligence with Flashpoint’s Josh Lefkowitz

Flashpoint is a business risk intelligence provider that has been protecting government and private sector assets for a long time. In fact, to paraphrase Jack Nicholson in A Few Good Men, “We have been sleeping under the blanket of their securit… Continue reading DevOps Chat: Security Intelligence with Flashpoint’s Josh Lefkowitz

Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study

A recent Ponemon study revealed a set of habits and practices that the most cyber resilient organizations undertake, such as adopting automation for tasks that don’t require human oversight.

The post Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study appeared first on Security Intelligence.

Continue reading Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study

Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics

By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection.

The post Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics appeared first on Security Intelligence.

Continue reading Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics