Using Threat Intelligence to Protect the Enterprise

If you are involved in Information Security in almost any way, you have probably heard the term “threat intelligence”. There are many misconceptions about what it truly is, ranging from data feeds, high-priced research analysis subscriptions, or that you need a dedicated team of SOC analysts to effectively implement threat intelligence. All of these notions are false. Instead, threat intelligence includes information and analysis from a wide variety of sources,…

Read more

Change is Hard

“If you want to make enemies, try to change something.” was once said by former US President Woodrow Wilson. Any engineer or architect who has ever been involved in network engineering or security would probably agree. Any change in an organization is hard, but when dealing with network administrators and “managers” that don’t acknowledge the existing problems or how the new solution will solve those problems – you have a…

Read more

Do You Have a Crystal Ball?

How do you prepare for the next cyber attack? Do you know what’s coming and are you prepared or do you have to scramble when an attack hits? Even with the best technology and security platforms deployed in your enterprise you can be caught flat-footed if you are not prepared. Threat intelligence plays an important role in helping protect an organization. Along with helping you see what’s happening within your…

Read more