Cybersecurity

Latest blogs

Topic : Cybersecurity
  • --Any--
  • Cybersecurity
  • Dark web
  • Intel and evidence
  • Managed attribution
  • OSINT
  • Web isolation

From suspicious links to a fundamental shift: the new National Cybersecurity Strategy

A breakdown of the new National Cybersecurity Strategy from the White House

OSINT news roundup: damage assessments, location data and, lagging intel strategies

Stay up to date with the latest OSINT news from around the world

Dentists aren't heart surgeons: pitfalls of building an intel team

If you don't want your dentist operating on your leg, NeedleStack guest A.J. Nash asks, why are you putting incident response in charge of…

How OSINT can give you an outsider’s perspective of your network

OSINT is a powerful tool to identify vulnerabilities in your organization. But with all the information out there, how do you zero in on…

A recent Google malvertising scheme highlights the need for secure research environment

Investigating a malvertising scheme that tricked one of the world’s largest search engines is a dangerous game. Here’s how to do so safely:

Automating collection for SOC investigations

Not just the realm of TIPs. Automated collection of deeper-dive online research related to SOC investigations is an important tool in an…

Silo by Authentic8 ranked top 5 G2 Leader in threat intelligence software

G2 has released their Summer 2022 reports, and — based on verified customer reviews — Silo remains a Leader in the Threat Intelligence…

SOC analysts: 3 non-negotiable needs for online investigation

An unprecedented level of cyber attacks and phishing attempts makes the security needs of SOC teams greater than ever

Cybersecurity executive order: one-year anniversary

The executive order, Improving the Nation’s Cybersecurity, seeks to improve the federal government’s cybersecurity across agencies. One…

Blog updates

Stay updated with the latest posts from the blog
Close
Close