I have millions of spam and threat emails hitting our network daily, who wants to buy this data? [on hold]

we see over 10 million threat and spam emails on a daily basis and provide this data to a handful of vendors. Can anyone suggest who else we should be speaking with re our feed and how they can make use of this data?

Continue reading I have millions of spam and threat emails hitting our network daily, who wants to buy this data? [on hold]

Thwarting the Insider Threat with Network Traffic Analysis

For decades, anyone analyzing network traffic concentrated on external network traffic, known as north-south traffic, through the perimeter via firewalls.  Although firewalls evolved to better analyze this traffic, two primary trends emerged: 1) c… Continue reading Thwarting the Insider Threat with Network Traffic Analysis

Thwarting the Insider Threat with Network Traffic Analysis

For decades, anyone analyzing network traffic concentrated on external network traffic, known as north-south traffic, through the perimeter via firewalls.  Although firewalls evolved to better analyze this traffic, two primary trends emerged: 1) c… Continue reading Thwarting the Insider Threat with Network Traffic Analysis

Brook Schoenfield Discusses Threat Modeling and Secure Design

Inner Circle Podcast Episode 028 Brook Schoenfield, Master Security Architect and Director of Advisory Services for IOActive, joins me for this week’s episode of the Inner Circle podcast. We talk about the focus of the cybersecurity industry on v… Continue reading Brook Schoenfield Discusses Threat Modeling and Secure Design

Threat Modeling: Protecting Security Infrastructures in 2019

A pressing challenge throughout 2019 is cybersecurity professionals must manage industry shifts as they protect security infrastructures. These industry trends and issues are compounded by a lack of visibility into the location and security of data inv… Continue reading Threat Modeling: Protecting Security Infrastructures in 2019