It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare

Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus.

The post It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare appeared first on Security Intelligence.

Continue reading It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare

Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

Researchers have discovered evidence of a threat group named London Blue, a U.K.-based collective that focuses on CFOs at mortgage companies, accounting firms and some of the world’s largest banks.

The post Why You Should Be Worried About London Blue’s Business Email Compromise Attacks appeared first on Security Intelligence.

Continue reading Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors

Since governments have so many potential attack vectors to manage, government cybersecurity professionals need clear processes, procedures and authority to harden vulnerable environments.

The post Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors appeared first on Security Intelligence.

Continue reading Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors

Lessons From the Data Encryption Front Line: Understanding Common Threats

There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns.

The post Lessons From the Data Encryption Front Line: Understanding Common Threats appeared first on Security Intelligence.

Continue reading Lessons From the Data Encryption Front Line: Understanding Common Threats

More Than Just a Fad: Lessons Learned About Threat Hunting in 2018

One cybersecurity capability that continues to prove it’s here to stay is threat hunting, a proactive approach to discovering and mitigating threats.

The post More Than Just a Fad: Lessons Learned About Threat Hunting in 2018 appeared first on Security Intelligence.

Continue reading More Than Just a Fad: Lessons Learned About Threat Hunting in 2018

5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics

By understanding the basics of DNS analytics, the common methods of attack and the tools available to security teams, you will be better prepared to protect your enterprise from hidden cyberthreats.

The post 5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics appeared first on Security Intelligence.

Continue reading 5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics

Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud

Financial institutions seeking a piece of the hot P2P payments market must act to prevent network fraud with a multilayered prevention approach that includes a robust fraud detection engine.

The post Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud appeared first on Security Intelligence.

Continue reading Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud

How to Stay One Step Ahead of Phishing Websites — Literally

Ahead-of-threat detection enables security professionals and consumers to identify potential phishing websites faster than traditional browser protection apps can blacklist active cyberthreats.

The post How to Stay One Step Ahead of Phishing Websites — Literally appeared first on Security Intelligence.

Continue reading How to Stay One Step Ahead of Phishing Websites — Literally

IBM Security Named a Leader in IDC Incident Response MarketScape Report

This year, IDC recognized IBM X-Force Incident Response and Intelligence Services (IRIS) for effectively streamlining incident response (IR) for customers around the globe.

The post IBM Security Named a Leader in IDC Incident Response MarketScape Report appeared first on Security Intelligence.

Continue reading IBM Security Named a Leader in IDC Incident Response MarketScape Report

How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries

Using unique methods of analyzing DNS data, advanced DNS analytics enables security teams to quickly and proactively find and eliminate potential threats.

The post How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries appeared first on Security Intelligence.

Continue reading How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries