Cybersecurity

Latest blogs

Topic : Cybersecurity
  • --Any--
  • Cybersecurity
  • Dark web
  • Intel and evidence
  • Managed attribution
  • OSINT
  • Web isolation

Dentists aren't heart surgeons: pitfalls of building an intel team

If you don't want your dentist operating on your leg, NeedleStack guest A.J. Nash asks, why are you putting incident response in charge of…

How OSINT can give you an outsider’s perspective of your network

OSINT is a powerful tool to identify vulnerabilities in your organization. But with all the information out there, how do you zero in on…

A recent Google malvertising scheme highlights the need for secure research environment

Investigating a malvertising scheme that tricked one of the world’s largest search engines is a dangerous game. Here’s how to do so safely:

Automating collection for SOC investigations

Not just the realm of TIPs. Automated collection of deeper-dive online research related to SOC investigations is an important tool in an…

Silo by Authentic8 ranked top 5 G2 Leader in threat intelligence software

G2 has released their Summer 2022 reports, and — based on verified customer reviews — Silo remains a Leader in the Threat Intelligence…

Non-negotiable security needs SOCs to combat rise in phishing

An unprecedented level of cyber attacks and phishing attempts makes the security needs of SOC teams greater than ever

Cybersecurity executive order: one-year anniversary

The executive order, Improving the Nation’s Cybersecurity, seeks to improve the federal government’s cybersecurity across agencies. One…

Give CTI its own seat at the table

Considering where cyberthreat intelligence teams should reside in the organizational structure can make a major difference in the…

Safely investigate phishing sites without getting hooked

Phishing sites commonly contain malicious content that can put SOCs and their organizations at risk as they conduct investigations. But…

Blog updates

Stay updated with the latest posts from the blog
Close
Close