Search results for:
-
Jun 11th, 2021
Detect and Contain Cyberattacks Faster With Intelligence-Driven SOAR
When it comes to containing cyberattacks and limiting their ability to cause harm within your environment, time is money. On average, a company able to detect and contain a breach in less than 200 day
-
Jun 8th, 2021
Risk Calculations Require Cyber Threat Intelligence
Businesses seeking to understand their risk exposure need to realize that they can’t adequately quantify risk without cyber threat intelligence on the capabilities, intentions, and most frequent
-
Jun 7th, 2021
Why Effective Cybersecurity Narratives Are Built Using Quantitative Metrics
As the world begins to get the global coronavirus pandemic under control, cybersecurity concerns are increasing. Attackers continue to build increasingly sophisticated capabilities, deploying them in
-
Jun 4th, 2021
How Risk Quantification Gives Your Security Team A Leg Up in Patch Management
Two of the major challenges facing most Security Operations Centers (SOCs) are patch management and alert prioritization. However, many organizations struggle with the complexity of keeping up-to-date
-
Jun 3rd, 2021
Dark Reading: The Colonial Pipeline Ransomware Attack Is Your Boardroom Wake-Up Call
The ransomware attack against the Colonial Pipeline system occurred almost 17 years to the day after I testified before the Senate Subcommittee on Terrorism, Technology, and Homeland Security on cyb
-
Jun 2nd, 2021
Importance of Automation in Event Prioritization
Event prioritization means organizing your events and picking the most important items to address first. The reason for this is simple and hopefully obvious: you want to identify which event is more i
-
Jun 1st, 2021
Cyberattacks on Critical Infrastructures Forcing Long Overdue Conversations About Risk
A cyberattack targeting the world’s largest meat processor over the weekend is pointing to a disturbing new reality: Our nation’s critical infrastructures and supply chains are being targeted beca
-
Jun 1st, 2021
3 Reasons The Insurance Industry Desperately Needs Automated Cyber Risk Quantification
The cyber insurance industry is in turmoil as more and more businesses seek insurance protection against the onslaught of advanced threats, particularly ransomware, while both carriers and those seeki
-
Jun 1st, 2021
H-ISAC TAXII Feed
The H-ISAC (Health Information Sharing and Analysis Center) provides STIX/TAXII feeds to its customers, enabling them to access real-time cyber threat intelligence in a standardized format for improve
-
May 26th, 2021
The ROI of Security and the SOC
The Return on Investment of any cybersecurity investment does not fall under the traditional definition of ROI. Cybersecurity is a pure cost center – in an average organization no revenue can ev
-
May 24th, 2021
Inside The Business Benefits of Automated Cyber Risk Quantification
Many businesses may have heard of cyber risk quantification (CRQ), but most businesses still don’t know what their exposure is to any given cyber event. And how could they when their security teams
-
May 24th, 2021
ThreatConnect and Freshservice: Better Ticket Management
ThreatConnect has released a Playbook App for joint customers to leverage Freshservice. With this new Playbook App, you can easily manage or create tickets in Freshservice from ThreatConnect. Repeatab