What Is the Dark Web and Why Would Businesses Use It?

What is the Dark Web, besides an underground haven for cybercriminals to exchange ideas and illicit data anonymously? It can also be a valuable tool for security teams looking to share threat data.

The post What Is the Dark Web and Why Would Businesses Use It? appeared first on Security Intelligence.

Continue reading What Is the Dark Web and Why Would Businesses Use It?

Know Your Security X’s and O’s: Your Cyberdefense Team Is Only as Good as Its Threat Intelligence

Just like a college basketball team needs to know its X’s and O’s to win the big game and cut down the nets, a security team needs threat intelligence to win the ongoing battle against cyberthreats.

The post Know Your Security X’s and O’s: Your Cyberdefense Team Is Only as Good as Its Threat Intelligence appeared first on Security Intelligence.

Continue reading Know Your Security X’s and O’s: Your Cyberdefense Team Is Only as Good as Its Threat Intelligence

Security Intelligence at the Strategic, Operational and Tactical Levels

By optimizing intelligence at the strategic, operational and tactical levels, organizations can promote collaboration and bolster the incident response capabilities of their security teams.

The post Security Intelligence at the Strategic, Operational and Tactical Levels appeared first on Security Intelligence.

Continue reading Security Intelligence at the Strategic, Operational and Tactical Levels

Security Pros Get an IBM Security Community They Can Call Their Own

The new IBM Security Community enables cybersecurity professionals to connect with peers, share threat intelligence and glean insights from subject matter experts.

The post Security Pros Get an IBM Security Community They Can Call Their Own appeared first on Security Intelligence.

Continue reading Security Pros Get an IBM Security Community They Can Call Their Own

Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats

To defend their confidential data from increasingly sophisticated cybercriminals, security teams must leverage machine learning to perform analytical tasks that are too tedious for humans to complete.

The post Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats appeared first on Security Intelligence.

Continue reading Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats

The Journey to Security and Cyber Resiliency

At Think 2018, attendees will learn how an integrated approach to security and resiliency can help them prevent cyberattacks and effectively respond to the ones that slip through their defenses.

The post The Journey to Security and Cyber Resiliency appeared first on Security Intelligence.

Continue reading The Journey to Security and Cyber Resiliency

No Rest for the Weary: Applying Security Lessons From 2017 in the New Year

How can it be that we are already through January and moving into February of the new year? I don’t know about you, but I still have a long list of resolutions to accomplish and I need to focus on what I can realistically get done in 2018. This makes me think about how everyone […]

The post No Rest for the Weary: Applying Security Lessons From 2017 in the New Year appeared first on Security Intelligence.

Continue reading No Rest for the Weary: Applying Security Lessons From 2017 in the New Year

Don’t Go It Alone: Building Relationships and Sharing Threat Intelligence for the Common Good

Companies across all verticals can diminish the impact of widespread cyberthreats by forging collaborative partnerships and sharing threat intelligence.

The post Don’t Go It Alone: Building Relationships and Sharing Threat Intelligence for the Common Good appeared first on Security Intelligence.

Continue reading Don’t Go It Alone: Building Relationships and Sharing Threat Intelligence for the Common Good

Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry

An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.

The post Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry appeared first on Security Intelligence.

Continue reading Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry

Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise

Before sharing indicators of compromise, analysts must consider the sensitivity of the data and verify the identities of the senders and receivers.

The post Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise appeared first on Security Intelligence.

Continue reading Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise