Posts
-
Jun 29th, 2015
Threat Intelligence within the Risk Management Process
How Threat Intelligence fits within Risk Management This is the second post in a series exploring the relationship of threat intelligence and risk management. If you missed the previous one, wherein
-
Jun 20th, 2015
China Hacks the Peace Palace: All Your EEZ’s Are Belong to Us
Executive Summary In early July 2015, Chinese APT actors used an Adobe Flash Player exploit within a specific webpage detailing a noteworthy international legal case between the Philippines and China.
-
Jun 19th, 2015
Threat Intelligence and Risk Management
Introduction to Threat Intelligence and Risk Management Several of us at ThreatConnect attended the Gartner Security & Risk Management Summit last week, which, conveniently took place right across
-
Jun 9th, 2015
OPM Breach Analysis: Update
As highlighted in our recent webinar with Rick Holland, when there is a security event of great magnitude, organizational leadership will want to know as much as possible about the technical WHAT and
-
Jun 5th, 2015
OPM Breach Analysis
Back in February 2015, the ThreatConnect team conducted in-depth independent analysis of the Anthem breach, finding connections to amorphous Chinese APT activity. Although our primary concern at the t
-
Jun 1st, 2015
Adversary Intelligence: Getting Behind the Keyboard
Arguably one of the most controversial subjects in Threat Intelligence currently is the topic of Attribution, or developing Adversary Intelligence. Industry pundits will debate attribution with a rel
-
May 29th, 2015
The Cost of Bad Threat Intelligence
The Cost of Bad (and Value of Good) Threat Intelligence Written by Andy Pendergast, co-author of the Diamond Model for Intrusion Analysis Earlier this week, Sergio Caltagirone. published an article on
-
May 26th, 2015
Threat Intelligence Sharing: Empower Your Cyber Defense
I am excited to see threat intelligence sharing is catching on as a way to empower cyber security defenders with timely, relevant, and actionable threat intelligence data. I believe, and I actually
-
May 5th, 2015
What’s the RSA Conference About, Daddy?
Like many of my infosec brethren and sistren (yep; apparently it’s a word), I leave some sad kids behind every year as I make the annual pilgrimage to the RSA 2015 Conference. This year, my 8 year o
-
Apr 15th, 2015
What the Verizon DBIR Says About Threat Intelligence Sharing
Before we get started on Verizon’s 2015 Data Breach Investigations Report (DBIR), let’s address the elephant in the room. I created the DBIR back in 2008 and have led the excellent team that produ
-
Mar 23rd, 2015
Is Your Threat Intelligence Platform Just a Tool?
“If the only tool you have is a hammer, you tend to see every problem as a nail.” Abraham Maslow Throughout the enterprise there are security personnel using a variety of processes and tools to co
-
Mar 18th, 2015
Premera Latest Healthcare Insurance Agency to be Breached
Similarities with Wellpoint/Anthem Event Should be Understood The recent announcement from Premera Blue Cross Blue Shield that it has fallen victim to a sophisticated cyber attack that reportedly comp