CISO’s need a plan of attack for their external digital risks. Join us to see how these 5 use cases will help you embrace ASM and make the most out of your investment.
Discovery of all assets;
Discovery of all vulnerabilities and prioritizing them;
Exposing shadow IT;
Measuring M&A risk;
Monitoring...
In his spare time, ransomware expert Allan Liska recently became a certified sommelier. Branching out from his day job as principal intelligence analyst at Recorded Future, Liska says he's found numerous parallels between the deductive tasting process and threat intelligence.
The war between Russia and Ukraine isn't an abstract concern for SecurityScorecard CEO Aleksandr Yampolskiy. It's a deeply personal one since Yampolskiy, who is now a U.S. citizen, grew up in Russia and rode the train to Ukraine every summer to visit his grandmother.
Former Rockwell Automation CISO Dawn Cappelli discusses the mission of the new Dragos OT-CERT - a cybersecurity resource designed to help industrial asset owners and operators build their OT cybersecurity programs, improve their security postures and reduce OT risk - and her role as its director.
Cyber adversaries are embracing defense evasion, triple extortion, wiper malware and the accelerated exploit chain, and that is significantly reshaping the threat landscape that CISOs have to deal with, according to Derek Manky, head of Fortinet's FortiGuard Labs.
While adversaries are often still using many of the same old methods and exploits to compromise their victims, the exposure and consequences of these attacks are becoming increasingly damaging, says Bryan Ware, CEO of LookingGlass Cyber Solutions. He discusses how to keep ahead of the adversaries.
Use this guide to help select the right threat intelligence solutions for your organization to understand and respond more efficiently to the threat landscape.
Download the report for to learn its key findings:
Threat actors continue to experience large-scale success against targets, due in large part to divided...
The Cyber Threat Alliance just celebrated its fifth birthday, and President and CEO J. Michael Daniel says the membership and information sharing both are growing at an impressive pace. He discusses the surge in ransomware and how organizations should respond.
When it comes to security today, perhaps the number one issue organizations are facing is the exponential growth of security threats, including the complexity and potential to inflict major damage. Security architects and Security Operations (SecOps) teams are scrambling to respond as enterprises continue to diversify...
Boston Children's Hospital thwarted a cyberattack by government-backed Iranian hackers last summer after U.S. authorities received intelligence about the pending assault and alerted the hospital, says FBI Director Christopher Wray, who called Iran's planned cyberattack "despicable."
ReliaQuest has agreed to buy Digital Shadows for $160 million to infuse its security operations platform with threat intelligence, attack surface management, and dark web monitoring. The deal will give clients more visibility and context around threats facing their networks, endpoints and cloud.
Obtaining threat insight is like practicing judo - you want to use your attacker's power against them, says Chris Borales, senior manager of product marketing at Gigamon. He and Tom Dager, CISO of Archer Daniels Midland Company, discuss how to keep pace with the evolving ransomware landscape.
Today’s threat intelligence market is difficult to navigate, and this guide is designed to help. This whitepaper breaks down the key strategies and tactics to help you avoid common pitfalls.
Download this guide to read more on:
Information vs Intelligence and why you need to know
Best practices for...
Download this whitepaper that shares insights into the threat landscape and the key findings of Q1 2022. Find out what are the most significant threats against financial sector organizations.
Download your report to stay up to date on:
Key developments in cyber threats facing the financial sector;
The most...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.