Tag: Threat Detection
-
Verizon Aims to Accelerate Threat Detection with New Service
Verizon is making threat intelligence from its own network and security operations available via a new Threat Intelligence Platform service …
-
What Are the Different Types of Cyberthreat Intelligence?
Cyberthreat intelligence: It’s a growing business (and buzzword) that provides many market …
-
Best Practices for Designing a Security Operations Center
Most security operations centers (SOCs) today use security information and event management (SIEM) tools — but security is not solely …
-
Simpler, Smarter Security With Intelligent Orchestration
Cyberattacks are growing more frequent, sophisticated and damaging, and organizations have invested hundreds of billions of dollars into …
-
Symantec Now Offers Threat Detection Tools Used by its Researchers
RSA CONFERENCE 2018 – San Francisco – Symantec today rolled out new threat detection features that are based on tools its research team …
-
Capsule8 introduces Linux workload attack detection platform
Capsule8 announced the general availability of Capsule8 1.0, a real-time, zero-day attack detection platform capable of scaling to massive …
-
Keep Your Eyes on the Threat Horizon to Improve Incident Response
The ever-growing list of cybersecurity threats looks like something out of a 21st century version of “The Wizard of Oz” — but instead …
-
What Is the Dark Web and Why Would Businesses Use It?
There’s the World Wide Web, and then there’s the less understood and presumably nefarious Dark Web — but not all who use the Dark Web …
-
Relieving Alert Fatigue With Personally Tailored Threat Intelligence
Most organizations that take IT security seriously have already invested in security controls. They have a security operations center (SOC) …
-
Know Your Security X’s and O’s: Your Cyberdefense Team Is Only as Good as Its Threat Intelligence
All of us in the security industry realize that we face a virtually insurmountable task to ensure that the data belonging to our …
-
Security Intelligence at the Strategic, Operational and Tactical Levels
Cyber intelligence comes in many forms. Some is urgent, some merely informative; some is highly technical, while some is broad and …
-
When Blocking and Tackling Strategies Fail, Take a Page Out of the Threat Hunting Playbook
You may have heard the term “chatter” during times of heightened security awareness. This often refers to increased communications …
●●●