5 simple steps to bring cyber threat intelligence sharing to your organization

Cyber threat intelligence (CTI) sharing is a critical tool for security analysts. It takes the learnings from a single organization and shares it across the industry to strengthen the security practices of all. By sharing CTI, security teams can alert … Continue reading 5 simple steps to bring cyber threat intelligence sharing to your organization

IT’s Confidence in Mitigating Cyberthreats Low

As cyberthreats evolve and increase in both voracity and velocity, many IT professionals are becoming increasingly worried about their organization’s ability to deal with those threats. That’s according to the results of a recent survey conducte… Continue reading IT’s Confidence in Mitigating Cyberthreats Low

BlindSide: Intel/AMD Speculation Bugs Under Microscope Again

Researchers have published frightening details on what they’re calling BlindSide, which relies on co-opting our old friend speculative execution.
The post BlindSide: Intel/AMD Speculation Bugs Under Microscope Again appeared first on Security Boulevar… Continue reading BlindSide: Intel/AMD Speculation Bugs Under Microscope Again

Intelligence-Sharing in Action: COVID-19 Cyber Threat Coalition

The COVID-19 Cyber Threat Coalition shows that not only is threat intelligence-sharing possible, but we thrive with it As we’ve seen time and again, cybercriminals will use any tragic event to take advantage of people when they are emotionally vulnera… Continue reading Intelligence-Sharing in Action: COVID-19 Cyber Threat Coalition

Russia, China, Iran Meddle in 2020 Election (Unsurprisingly)

It comes as no surprise to hear that Russia is up to its old tricks. China and Iran are also in on the game.
The post Russia, China, Iran Meddle in 2020 Election (Unsurprisingly) appeared first on Security Boulevard.
Continue reading Russia, China, Iran Meddle in 2020 Election (Unsurprisingly)

Combating Malware in 2020: Process, Trends and Tools [Video]

Stay a step ahead of the adversaries planning their attack. The right framework prepares you, the latest data empowers you, and the right tools enable you.
The post Combating Malware in 2020: Process, Trends and Tools [Video] appeared first on Security… Continue reading Combating Malware in 2020: Process, Trends and Tools [Video]

Incident Response: 5 Steps to Prevent False Positives

False positive alerts in your threat intel platform can leave your team scrambling. It’s like driving to the wrong address. You reach a place, but also waste time you could have used at your intended destination. For security teams, knowing how to screen for false positives saves time and makes the team more efficient at […]

The post Incident Response: 5 Steps to Prevent False Positives appeared first on Security Intelligence.

Continue reading Incident Response: 5 Steps to Prevent False Positives

Netskope Unveils Free Real-Time Threat Intelligence Exchange

Netskope today launched a Cloud Threat Exchange portal through which it will share threat intelligence with customers and partners for free. Company CTO Krishna Narayanaswamy said the Cloud Threat Exchange will automate the delivery and distribution i… Continue reading Netskope Unveils Free Real-Time Threat Intelligence Exchange

SOC 2.0: A Guide to Building a Strong Security Ops Team

In a security operations center (SOC), your cybersecurity tools are only as good as the people using them and your SOC’s culture. What are the critical SOC roles? What qualities should you look for when hiring for them? And, what should you expect from a cybersecurity career? Drawing from my experience working in IBM Security’s […]

The post SOC 2.0: A Guide to Building a Strong Security Ops Team appeared first on Security Intelligence.

Continue reading SOC 2.0: A Guide to Building a Strong Security Ops Team