Search results for:
-
Jun 1st, 2015
Adversary Intelligence: Getting Behind the Keyboard
Arguably one of the most controversial subjects in Threat Intelligence currently is the topic of Attribution, or developing Adversary Intelligence. Industry pundits will debate attribution with a rel
-
Jun 1st, 2015
ThreatConnect, Inc. is Short-Listed for the 2015 Red Herring Top 100 North America Award
Arlington, VA – June 1, 2015 – ThreatConnect, Inc. announced today it has been short-listed for Red Herring’s Top 100 North America award, a prestigious list honoring the year’
-
May 29th, 2015
The Cost of Bad Threat Intelligence
The Cost of Bad (and Value of Good) Threat Intelligence Written by Andy Pendergast, co-author of the Diamond Model for Intrusion Analysis Earlier this week, Sergio Caltagirone. published an article on
-
May 26th, 2015
Threat Intelligence Sharing: Empower Your Cyber Defense
I am excited to see threat intelligence sharing is catching on as a way to empower cyber security defenders with timely, relevant, and actionable threat intelligence data. I believe, and I actually
-
May 18th, 2015
ThreatConnect, Inc. Announces STIX Integration
ISAC and ISAO Members Better Able to Share and Aggregate Threat Intelligence into Existing Security Processes to Defend Organizations ThreatConnect, Inc., creator of the most widely adopted Threat Int
-
May 5th, 2015
What’s the RSA Conference About, Daddy?
Like many of my infosec brethren and sistren (yep; apparently it’s a word), I leave some sad kids behind every year as I make the annual pilgrimage to the RSA 2015 Conference. This year, my 8 year o
-
Apr 22nd, 2015
April 21 – DC Inno: 7 DC-Area Cybersecurity Startups to Watch
By: Chris Bing April 21, 2015 Here at DC Inno, we spend a lot of time tracking the red-hot cybersecurity sector in D.C., Virginia and Maryland, both in government and in business. But to get a sense
-
Apr 15th, 2015
What the Verizon DBIR Says About Threat Intelligence Sharing
Before we get started on Verizon’s 2015 Data Breach Investigations Report (DBIR), let’s address the elephant in the room. I created the DBIR back in 2008 and have led the excellent team that produ
-
Mar 23rd, 2015
Is Your Threat Intelligence Platform Just a Tool?
“If the only tool you have is a hammer, you tend to see every problem as a nail.” Abraham Maslow Throughout the enterprise there are security personnel using a variety of processes and tools to co
-
Mar 18th, 2015
Premera Latest Healthcare Insurance Agency to be Breached
Similarities with Wellpoint/Anthem Event Should be Understood The recent announcement from Premera Blue Cross Blue Shield that it has fallen victim to a sophisticated cyber attack that reportedly comp
-
Feb 27th, 2015
The Anthem Hack: All Roads Lead to China
When news of the Anthem breach was reported on February 4th, 2015, the security industry quite understandably went wild. A breach of this magnitude was certainly unprecedented. Naturally, many indus
-
Feb 15th, 2015
ThreatConnect How To: Pivoting & Exporting Data
Introduction The Diamond Model of Intrusion Analysis is the analytic methodology upon which ThreatConnect is built. Developed by a number of preeminent security researchers and analysts (including o