Building a cyber-resilient enterprise informed by threat intelligence is not an easy task. Risks and requirements are often as unique and diverse as organizations themselves. Determining factors like industry, size, and market contribute to one simple truth: a one-size-fits-all approach to incorporating threat intelligence does not exist. Some invariants, however, do remain; successful threat intelligence programs must staff the right people in the right positions. Below, I’ll introduce four core threat intelligence focuses to consider as businesses plan and allocate budgets for 2021:
Analyst1, provider of a threat intelligence platform (TIP), added recognized cybersecurity industry veteran, Jon DiMaggio, to its executive team. As chief security strategist, DiMaggio will be responsible for driving security research and strategy for the next generation threat intel company.
Sr. Advisor Felker brings additional maritime cybersecurity partnership expertise to information sharing and analysis center
November 12, 2020
John Felker, former Assistant Director, Cybersecurity and Infrastructure Security Agency brings significant public-private sector relationship building expertise to the Maritime Transportation System Information Sharing and Analysis Center’s (MTS-ISAC) nonprofit, community focused mission.
Proactive cybersecurity programs include comprehensive activities that involve not only the IT and security teams, but also the CEO and boards of directors. Examples of key proactive activities include identifying risk tolerance, defining governance structures, and developing comprehensive security strategies. Throughout this article, we will review key domains where organizations can proactively fortify their cybersecurity measures. COVID-19 has increased threat activity and created unique changes — and increased risk — in IT environments. Now is the time to review some “quick hit” areas where you can bolster your cybersecurity and execute your winning strategy.
Derek Abdine has joined Censys, Inc. as Chief Technology Officer (CTO). An accomplished researcher, advisor and evangelist to the security community, Abdine brings over 15 years of leadership experience in the computer security industry.
Mandiant Threat Intelligence researchers have identified FIN11, a financially-motivated hacking group behind bold, large and long-running malware campaigns. The hackers have expanded their range of targets the past two years while using increasingly aggressive ransomware attacks.
Digital Guardian announced Tim Bandos will become Chief Information Security Officer (CISO). Bandos will bring more than 15 years of experience to the position including his five years as VP of Cybersecurity at Digital Guardian. Prior to joining Digital Guardian, Bandos was Director of Cybersecurity for Dupont where he was responsible for overseeing internal controls, incident response and threat intelligence.
Digital Shadows explored four main themes via which threat actors’ personalities or real-life identities are expressed on cybercriminal forums, providing examples they've observed over the years. This first blog looked at gender and nationality, while the second in the series examined morality and forum dynamics.
As September is National Insider Threat Awareness Month, there is no better time than the present to seriously reconsider how we educate America’s next generation of business leaders about these critical intelligence issues. As we wait on MBA programs to catch up to America’s new geopolitical reality, these are the three most important issues business schools, early stage entrepreneurs, and even seasoned pros should consider as they protect their life’s work.
This month, Security magazine brings you the Security 500 Report, Rankings and Thought Leader Profiles. How does your enterprise compare to others? Which security programs are leading the way? Also this month, we highlight how to plan, prepare for and build resilience to protests and other unplanned events, video surveillance tools for SMBs and more.