Skip to content
zvelo
We Categorize the Web®
zvelozvelo
  • Products
    • zveloDB™ URL Database
    • zveloCAT™ Real-Time URL Classifications
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
Check a URL
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources 
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
  • zveloLIVE

Tag Archives: Threat Feeds

You are here:
  1. Home
  2. Entries tagged with "Threat Feeds"

Embracing Curated Threat Intelligence in Times of Cost-Cutting

Embracing Curated Threat Intelligence in Times of Cost-Cutting

Cyber Threat Intelligence, Cybercrime, CybersecurityBy zveloDecember 14, 2023

Explore how curated threat intelligence offers a strategic, cost-effective solution in the face of cybersecurity budget cuts.

AI Isn't a Magic Wand: The Real Solution to Alert Fatigue

AI Isn’t a Magic Wand: The Real Solution to Alert Fatigue

AI & Machine Learning, Cyber Threat Intelligence, CybersecurityBy zveloOctober 2, 2023

AI isn’t a magic fix for alert fatigue. See what it really takes to slash false positives and solve the complexities of alert management.

primary questions to answer during threat feed evaluation

Threat Feed Evaluations: Primary Questions to Answer

Cyber Threat Intelligence, CybersecurityBy zveloAugust 1, 2023

The third post in the threat feed evaluation series, this blog outlines the essential questions to address during the feed evaluation process.

Top 3 Misconceptions When Evaluating zvelo Threat Feeds

Evaluating Threat Feeds: Top 3 Misconceptions

Cyber Threat Intelligence, Malicious Detection, Phishing DetectionBy zveloJuly 25, 2023

Part 2 in the series, this post addresses the most common misconceptions that can skew or misrepresent the results of a threat feed evaluation.

key-considerations-for-evaluating-threat-feeds

Threat Feed Evaluations: Key Areas for Consideration

Cyber Threat Intelligence, Malicious Detection, Phishing DetectionBy zveloJuly 18, 2023

Part 1 in a series on how to evaluate threat feeds, this post focuses on the key areas to measure to help guide your decision making process.

why-curated-threat-data-is-critical-to-actionable-threat-intelligence

Why Curated Threat Data is Critical to Effective Threat Protection

Cyber Threat Intelligence, CybersecurityBy zveloJune 28, 2023

Curated threat data delivers the true value of threat intelligence by offering the right data, accurately interpreted, and actionably presented.

AI and Machine Learning in Cybersecurity

AI and Machine Learning in Cybersecurity

AI & Machine Learning, CybersecurityBy zveloMay 17, 2023

This post explores AI and Machine Learning for cybersecurity, including the various types, applications, challenges, and future potential.

zvelo-cyber-threat-intelligence

Cyber Threat Intelligence

Cyber Threat Intelligence, CybersecurityBy zveloMarch 7, 2023

A comprehensive overview of cyber threat intelligence: What it is, how it’s used, the process lifecycle, use cases, and evaluation guidelines.

cybercrime-prevention-requires-premium-threat-intelligence

Premium Threat Intel: A Vital Investment in Cybercrime Prevention

Cyber Threat Intelligence, Cybercrime, Cybersecurity, Information Security, Malicious Detection, Network Security, Phishing DetectionBy zveloDecember 19, 2022

A curated threat intelligence approach, in which aging data is managed based on current attack status, is crucial to preventing cybercrime.

AitM-Adversary-in-the-Middle-Attacker-TTP-to-bypass-MFA-security

AiTM Phishing Attacks: Keeping Up with Attacker TTPs

Cyber Threat Intelligence, Cybersecurity, Malicious Detection, Phishing DetectionBy zveloNovember 10, 2022

Attackers are turning up the heat with advanced TTPs like Adversary-in-the-Middle (AiTM) phishing attacks to steal session cookies and bypass MFA security.

→12→
zvelo | We Categorize the Web® | Footer Logo

+1 (720) 897-8113
+1 (877) 77-zvelo (Toll Free)

zvelo US Headquarters Denver, Colorado USA

Contact Us
Products
  • zveloDB™ URL Database
  • zveloCAT™
  • Threat Intelligence
  • Phishing Intelligence
  • PhishScan™
  • SaaS App Intelligence
Use Cases
  • Web & DNS Filtering
  • (SASE) Secure Access Service Edge
  • (XDR) Extended Detection and Response
  • (DLP) Data Loss Prevention
  • (ZTNA) Zero Trust Network Access
  • (SPM) Security Posture Management
  • Secure Browsers
  • Human Risk Management
  • Threat Research
  • Brand Safety & Contextual Targeting
Resources
  • Blog, News & Press
  • Case Studies
  • zvelo’s Top SaaS Apps List
  • Datasheets, White Papers, & Reports
  • Videos, Webinars, & Virtual Events
  • Cyber Threat Definitions
Company
  • About zvelo
  • Contact Us
  • Careers at zvelo
  • Executive Leadership
  • Privacy
  • Legal
More

2025 zvelo, Inc. All rights reserved.

Go to Top