Predicting the chief security concerns of 2021

| | Blog, Industry, research
End of year predictions, evaluations and recommendations are commonplace in our industry, though no one could predict this time last year just quite how 2020 would pan out, and the far-reaching ramifications it would have. The office as we once knew it is, for now, a thing of the past, ... Read More

How far does endpoint detection and response (EDR) take you to complete threat intelligence?

Lots of new cyber vendors are starting up all the time. Crunchbase’s list of top cybersecurity startups  is 1,089 businesses long. What you find is that everyone is specialized in their own particular segment; their own slice of technology to remedy a specific cybersecurity need. Which brings us to EDR ... Read More

Maximize SOAR investment returns with contextualized threat intelligence

Automation creates efficiency. Reducing the need for humans to complete repetitive tasks has been fundamental to the evolution of technology since the very beginning and remains a key part of current thinking around optimal cybersecurity operations. Likewise orchestration, another fundamental tenet of using software to drive business value. Orchestration integrates ... Read More

How incident response teams and orchestration SOCs benefit from threat intelligence

The work of a security analyst is more frustrating than it should be when there is too much information and never enough time. Incident response (IR) teams can find themselves similarly hamstrung; primed to jump on and mitigate cyber emergencies but not always arriving fast enough or having the right ... Read More

Calculating the ROI of Digital Risk Protection (DRP)

| | Blog
Businesses see huge value in their digital assets, and this is fuelling the need to manage associated risks – making digital risk protection (DRP)  a significant corporate priority. DRP is a critical part of the cybersecurity toolset, and one that marks an important evolutionary step in the development of advanced ... Read More

Threat intelligence in a post Covid-19 world. Where do we go from here?

Even before the start of 2020, industry watchers were predicting this would be a decade of digital disruption. Just 7 months in and another “D” has become prominent: “Dependency”. If the Covid pandemic has revealed anything then surely it is how the global economy, and society in general, relies so ... Read More

Enhancing the value of threat intelligence via a mature, flexible API

The compelling business value of threat intelligence is best realised when it is used in the optimum way. And while there are many examples of repeatable good practice to adopt , by far the most advantageous approach is to apply threat intelligence to the precise needs of each organization. This ... Read More

What are AI and machine learning adding to threat intelligence – brains, brawn or both?

Too much information and not enough time. This, and the cost of labor, is why machines have been at the forefront of cyber defense for almost 50 years. It is also why new breakthroughs in software development, neural networks, machine learning and artificial intelligence (AI) are constantly harnessed by providers ... Read More

Threat actors target a vulnerable healthcare industry amid Coronavirus outbreak

| | Blog, Industry
As the outbreak of Covid-19 escalated earlier this month we observed that the global cybercrime community has capitalized on public fear. Initially targeting civilians through phishing campaigns in the guise of the World Health Organisation (WHO) and the US Centers for Disease Control and Prevention (CDC), as well as local ... Read More

Blueliv and King & Union announce strategic partnership for threat intelligence services

| | Blog, Corporate, partner
US-based cyber vendor harnesses Blueliv threat intelligence for its Avalon Cyber Analysis Platform and new suite of Culper Group services BARCELONA, Spain & ALEXANDRIA, Va. (US) – June 23, 2020 – Blueliv, a leading provider of enterprise-class threat intelligence solutions, and King & Union, creator of the Avalon Cyber Analysis ... Read More

Secure Guardrails