Search results for:
-
Jun 21st, 2021
Cyber-Risk Quantification is the Icing on the Cake for Security Frameworks
Today, we thought we would have a little fun talking about security frameworks and how cyber risk quantification is the missing ingredient you need to cook up more mature security models. Security f
-
Jun 17th, 2021
LinkedIn
LinkedIn is a business and employment-focused social media platform that works through websites and mobile apps.
-
Jun 16th, 2021
GreyNoise and ThreatConnect: Protect against Noisy IPs
ThreatConnect has released a new GreyNoise Playbook App. GreyNoise helps analysts quickly understand which alerts don’t matter by providing context on noisy IP addresses across the internet. With th
-
Jun 11th, 2021
Detect and Contain Cyberattacks Faster With Intelligence-Driven SOAR
When it comes to containing cyberattacks and limiting their ability to cause harm within your environment, time is money. On average, a company able to detect and contain a breach in less than 200 day
-
Jun 8th, 2021
Risk Calculations Require Cyber Threat Intelligence
Businesses seeking to understand their risk exposure need to realize that they can’t adequately quantify risk without cyber threat intelligence on the capabilities, intentions, and most frequent
-
Jun 7th, 2021
Why Effective Cybersecurity Narratives Are Built Using Quantitative Metrics
As the world begins to get the global coronavirus pandemic under control, cybersecurity concerns are increasing. Attackers continue to build increasingly sophisticated capabilities, deploying them in
-
Jun 4th, 2021
How Risk Quantification Gives Your Security Team A Leg Up in Patch Management
Two of the major challenges facing most Security Operations Centers (SOCs) are patch management and alert prioritization. However, many organizations struggle with the complexity of keeping up-to-date
-
Jun 3rd, 2021
Dark Reading: The Colonial Pipeline Ransomware Attack Is Your Boardroom Wake-Up Call
The ransomware attack against the Colonial Pipeline system occurred almost 17 years to the day after I testified before the Senate Subcommittee on Terrorism, Technology, and Homeland Security on cyb
-
Jun 2nd, 2021
Importance of Automation in Event Prioritization
Event prioritization means organizing your events and picking the most important items to address first. The reason for this is simple and hopefully obvious: you want to identify which event is more i
-
Jun 1st, 2021
Cyberattacks on Critical Infrastructures Forcing Long Overdue Conversations About Risk
A cyberattack targeting the world’s largest meat processor over the weekend is pointing to a disturbing new reality: Our nation’s critical infrastructures and supply chains are being targeted beca
-
Jun 1st, 2021
3 Reasons The Insurance Industry Desperately Needs Automated Cyber Risk Quantification
The cyber insurance industry is in turmoil as more and more businesses seek insurance protection against the onslaught of advanced threats, particularly ransomware, while both carriers and those seeki
-
Jun 1st, 2021
H-ISAC TAXII Feed
The H-ISAC (Health Information Sharing and Analysis Center) provides STIX/TAXII feeds to its customers, enabling them to access real-time cyber threat intelligence in a standardized format for improve