5 Questions On OPSEC Fundamentals

5 Questions On OPSEC Fundamentals

| | Blog, CTI Strategies
Surveillance is everywhere and ingrained in our society. While privacy is a human right, we live in an era of Operational Security (OPSEC) and privacy fatigue. The technologies we use everyday collect ...
6 Things to Know About Improving Threat Intelligence Collection

6 Things to Know About Improving Threat Intelligence Collection

| | Blog, CTI Strategies
Flare recently hosted our first Threat Intel Workshop with Senior Threat Intelligence Researcher Tammy Harper. Below are some of the questions Tammy covered in improving threat intelligence collection practices. 1. How does ...
Red Teaming the Modern Attack Landscape

Red Teaming the Modern Attack Landscape

| | Blog, CTI Strategies
In today’s expanded attack surface, new technologies create new opportunities for businesses and malicious actors. Attackers can use the same artificial intelligence (AI) and large language models (LLMs) that companies use, often ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Using CTI to Help Predict Vulnerability" with a light orange arrow pointing down.

Using CTI to Help Predict Vulnerability Exploitability

| | Blog, CTI Strategies
In a world of increasingly powerful data analytics, security researchers continue to develop new uses for artificial intelligence (AI) and machine learning (ML). In security, predictive analytics offer insight into how a ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Implement Continuous Threat Exposure Management." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Implement Continuous Threat Exposure Management: A Quick Guide for 2024

| | Blog, CTI Strategies
This year, Gartner named “Continuous Threat Exposure Management (CTEM)” as one of the top trends for Optimizing for Resilience. This is a response to increasing attack surfaces and thus cybercrime, and is ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Third-Party Cybersecurity Risk Management: A Short Guide for 2024." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Third-Party Cybersecurity Risk Management: A Short Guide for 2024

| | Blog, CTI Strategies
Third-parties are an important part of your extended enterprise. They’re your vendors, your partners, and your suppliers. They provide some of your business’s most critical services: billing, data storage, or sales. Unfortunately, ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Supply Chain Security and NIS2: What You Need to Know." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Supply Chain Security and NIS2: What You Need to Know

| | Blog, CTI Strategies
The Network Information Systems Directive (NIS2) and its predecessor NIS focus on risk management for organizations. The EU states that the NIS is the first piece of EU-wide legislation on cybersecurity with ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Third-Party Cybersecurity Risk Management: A Short Guide for 2024." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Third-Party Cybersecurity Risk Management: A Short Guide for 2024

| | Blog, CTI Strategies
Third-parties are an important part of your extended enterprise. They’re your vendors, your partners, and your suppliers. They provide some of your business’s most critical services: billing, data storage, or sales. Unfortunately, ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Supply Chain Security and NIS2: What You Need to Know." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Supply Chain Security and NIS2: What You Need to Know

| | Blog, CTI Strategies
The Network Information Systems Directive (NIS2) and its predecessor NIS focus on risk management for organizations. The EU states that the NIS is the first piece of EU-wide legislation on cybersecurity with ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "NIS2 Compliance: Updated for 2024, Complete Guide" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

NIS2 Compliance: Updated for 2024,  Complete Guide

| | Blog, CTI Strategies
The Network Information Systems Directive (NIS) was published in 2016 and required EU critical infrastructure sectors to meet basic cybersecurity compliance requirements. In October 2024 the second iteration of the Network Information ...