Feb 10

CTO Perspectives, Part II: Alternatives to Drinking from a Threat Intelligence Fire Hose

General Cyber Intel

 

Firefighter during training

This is the second blog in a three-part series by our Chief Technology Officer, Allan Thomson. In today’s post, he discusses the need for threat intelligence in reducing your organization’s risk profile.

In the previous blog, we discussed the various artifacts of Threat Intelligence and how each aspect may help reduce risk in your security profile. We discussed how important it is to choose the right focus or scope where Threat Intelligence (TI) may be leveraged in your environment. Choosing an appropriate scope ensures improved return on investment for your TI efforts.

Read more

Feb 8

Weekly Phishing Report: February 8, 2016

General Cyber Intel Phishing

 

Phishing Report: Top Targets

Week of January 31 – February 6, 2016
Author: Robert McDaniel

 

Phishing Report - February 8, 2016

In this week’s phishing report, we saw an increase (>60%) in overall phishing activity for the top 20 brands we’re tracking, grouped by industry. Storage & Systems Management Software saw a large increase (>110%), followed by Internet Information Services (>50%). Computer Hardware saw the greatest decrease in phishing activity (>45%). Read more

Feb 3

CTO Perspectives: Why Do Security Professionals Need Threat Intelligence?

General Cyber Intel

 

Man with crystal ball

This is the first blog in a three-part series by our Chief Technology Officer, Allan Thomson. In today’s post, he discusses the need for threat intelligence in reducing your organization’s risk profile.

Do you want to be more proactive in managing risk in security operations? Most professionals would answer that they would like less exposure to threats but often do not have sufficient time, knowledge or personnel to implement all factors that influence their risk profile.

Prior security events and incidents often allow security professionals opportunities to learn valuable lessons that impact their risk profile going forward. But, what is the risk if you don’t pay attention to knowledge learned from these previous events?

Ireland - Warning! Car Over Cliff

Other real world events can teach us important lessons in this regard. For example, if you drive off a 200-foot-cliff in a speeding automobile, and you ignored the sign indicating the cliff, then the outcome will very likely be significant physical harm.

If we paid attention to this sign and had knowledge of its meaning, then it would reduce our risk of injury. If we had the misfortune of this event, then our learned experience would teach us to avoid such pitfalls in the future. This is a fairly obvious example of paying attention to a sign and avoiding risk.

When is it harder to avoid such risk in a security world? It is usually due to a myriad of factors that have direct and indirect influence on the outcome. They introduce uncertainty in the outcome.

Read more

Feb 1

Weekly Phishing Report – February 1, 2016

General Cyber Intel Phishing

 

Phishing Report: Top Targets

Week of January 24 – 30, 2016
Author: Robert McDaniel

Phishing Report - February 2, 2016

 

In this week’s phishing report, we saw an increase (>15%) in overall phishing activity for the top 20 brands we’re tracking, grouped by industry. Internet Content Providers saw the largest increase (>215%), followed by Government (>95%), and Computer Hardware (>50%). Computer Software  saw the greatest decrease in phishing activity (>40%). Read more

Jan 29

White Paper Sneak Peek: Homegrown Terrorism May Pose Threat to Super Bowl® Security

General Cyber Intel

 

American football.

By Marc Larson and Hans Mathias Moeller

Super Bowl® 50 will take place at Levi’s Stadium in Santa Clara, California on February 7. The event is expected to draw more than one million people to the San Francisco Bay area. After reviewing open source threat intelligence (OSINT) available to date, analysts in our Special Investigations Unit have provided an assessment of Super Bowl® security in our white paper, “Physical Threat Assessment for Super Bowl® 50.”

While we have not identified expressed threats by terrorists to attack the 2016 Super Bowl®, homegrown violent extremists (HVE) and international terrorist networks have demonstrated past interest in attacking sporting events and football stadiums, including the 2015 Super Bowl®. Based on our analysis, we see homegrown terrorism inspired by jihadist terrorist networks as the biggest potential threat to the 2016 Super Bowl® security.

Read more

Jan 26

Cyveillance Weekly Phishing Report – January 26, 2016

General Cyber Intel Phishing

 

Phishing Report: Top Targets

Week of January 17 – 23, 2016
Author: Robert McDaniel

 

Phishing Report

In this week’s phishing report, we saw a decrease (>15%) in overall phishing activity for the top 20 brands we’re tracking, grouped by industry. Electronic Payment Systems saw the largest decrease (>35%), followed by Internet Content Providers (>30%), and eCommerce (>30%). Banking saw a nominal increase (>45%) and Government has jumped onto the list. We expect to see an increase in phishing incidents in Government as tax season approaches. Read more

Jan 21

When It Comes to Your Brand Reputation, the Damage Can Be Real

Brand Protection General Cyber Intel

 

Btrand-definition-27a9e-2

By Emilio Iasiello

Everyone has likely heard the phrase, “it’s not if, it’s when” in regards to security breaches. We often see brand reputation tarnished in the wake of a breach, yet many brands don’t have proactive brand protection procedures in place to mitigate threats before damage can occur. With millions of individuals’ personal identifiable information at risk, the fact remains that breaches are an everyday concern and will undoubtedly impact all organizations and the public at some time or another.

Read more

Subscribe to Our Blog!

Join thousands of security professionals and get our latest blog content in your inbox.

Your information will never be shared.

CLOSE