Building a threat intelligence program? How to avoid the ‘feed’ frenzy
Cyberthreat intelligence is just data if it is not actionable. We offer tips to help your team focus on relevant CTI for faster threat detection and response…
Read More
December 1, 2016
New products of the week 11.28.16
This latest version of LogRhythm’s security intelligence and analytics platform features more powerful machine analytics, embedded security automation and orchestration, and enhanced performance at scale…
Read More
November 28, 2016
How should Trump handle nation’s cybersecurity problems?
Hackers are everywhere, causing ever more problems, leading many to ask: How should Donald Trump deal with cybersecurity when he becomes president on Jan. 20? It’s an issue he might have to address almost immediately…
Read More
November 28, 2016
Is Windows 10’s built-in security good enough?
Built into the operating system is a program called Windows Defender. This is Windows’ version of anti-virus software that is geared toward not only protecting against dangerous files but also dangerous behaviors…
Read More
November 21, 2016
Why Microsoft Outlook and other e-mail services know the motel you’re staying at
There are two types of companies in the world: Those that know they’ve been hacked and those that don’t. But in this case, there appears to be a third: people who use e-mail…
Read More
November 14, 2016
When a cyber stranger wants $300 in iTunes gift cards to fix your PC, please question it
Let’s start with obvious: strangers — especially cyber strangers. Huge red flag when they demand money…
Read More
November 7, 2016