eBook – Threat intelligence platforms: Everything you’ve ever wanted to know

Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus programs, and traditional incident response methodologies by themselves are no long… Continue reading eBook – Threat intelligence platforms: Everything you’ve ever wanted to know

Help Net Security report: SecBI’s automated threat detection, response and hunting

SOCs constantly need tools to improve effectiveness, efficiency, and productivity. In surveying the market, Help Net Security evaluated SecBI’s solution for improvement via automated threat detection, response and hunting. Read our report to find… Continue reading Help Net Security report: SecBI’s automated threat detection, response and hunting

Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial

As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like Malware Information Sharing Platform (MISP), or buy a TIP from one of many vendors o… Continue reading Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial

Whitepaper: Building a Threat Intelligence Programme (UK)

ThreatConnect surveyed more than 350 cybersecurity decision makers in the UK. The result: Building a Threat Intelligence Programme discusses research findings on best practices and impact of those programmes. Cybersecurity decision makers in organisati… Continue reading Whitepaper: Building a Threat Intelligence Programme (UK)

Incident response at the speed of light: Cynet launches free offering for incident response service providers

More and more, organizations take the route of outsourcing incident response to Managed Security Service Providers. This trend is distinct regardless of the organization’s cyber maturity level and can be found across a wide range of cyber maturity, fro… Continue reading Incident response at the speed of light: Cynet launches free offering for incident response service providers

Webinar: Inside a Docker cryptojacking exploit

In this webinar, Ethan Hansen, Security Analyst for Threat Stack’s Cloud Security Operations Program, will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injecti… Continue reading Webinar: Inside a Docker cryptojacking exploit

Whitepaper: Maturing a Threat Intelligence Program

Whether you are getting started with TI or seeking to expand an existing program, the Threat Intelligence Maturity Model provides a systematic guide to help you understand where your organization resides on the path to a mature threat intelligence prog… Continue reading Whitepaper: Maturing a Threat Intelligence Program

The Cynet Free Visibility experience: Unmatched insight into IT assets and activities

Real-time visibility into IT assets and activities introduces speed and efficiency to many critical productivity and security tasks organizations are struggling with, from conventional asset inventory reporting to proactive elimination of exposed attac… Continue reading The Cynet Free Visibility experience: Unmatched insight into IT assets and activities