The third post in the threat feed evaluation series, this blog outlines the essential questions to address during the feed evaluation process.
Part 2 in the series, this post addresses the most common misconceptions that can skew or misrepresent the results of a threat feed evaluation.
Part 1 in a series on how to evaluate threat feeds, this post focuses on the key areas to measure to help guide your decision making process.
Curated threat data delivers the true value of threat intelligence by offering the right data, accurately interpreted, and actionably presented.
This post explores AI and Machine Learning for cybersecurity, including the various types, applications, challenges, and future potential.
A comprehensive overview of cyber threat intelligence: What it is, how it’s used, the process lifecycle, use cases, and evaluation guidelines.
A curated threat intelligence approach, in which aging data is managed based on current attack status, is crucial to preventing cybercrime.
Attackers are turning up the heat with advanced TTPs like Adversary-in-the-Middle (AiTM) phishing attacks to steal session cookies and bypass MFA security.
OSINT vs Commercial Threat Intelligence – A high level overview weighing the pros and cons for each type of threat feed.
Ingesting threat feeds to build in-house cyber threat intel solutions will prove to be a costly mistake for most. Do you have what it takes?