Cybersecurity Insights with Contrast CISO David Lindner | 04/11/25

Cybersecurity Insights with Contrast CISO David Lindner | 04/11/25

Insight No. 1 — How to survive without CISA As CISA scales back, it’s time for enterprises to wake up to a harsh reality: You can’t rely on the government to secure ...

Domain Reputation Update Oct 2024 – Mar 2025

New domains are up 7.39%, with 2.9 million malicious domains detected. Chinese gambling sites dominate the Top 20 TLDs, while .top remains a hotspot for abuse - this time with a spike ...
Why Only Phishing Simulations Are Not Enough

Why Only Phishing Simulations Are Not Enough

In the world of cybersecurity awareness, phishing simulations have long been touted as the frontline defense against cyber threats. However, while they are instrumental, relying solely on these simulations can leave significant ...

How I’m fighting cybercrime with Spamhaus (and how you can too!)

Meet Jeroen Gui - student, founder of JustGuard, and a top contributor to Spamhaus' Threat Intel Community Portal. Passionate about making the internet a safer place, Jeroen submits thousands of malicious domains, ...
15+ Years of Loading Threat Intel into SIEM: Why Does This Still Suck?

15+ Years of Loading Threat Intel into SIEM: Why Does This Still Suck?

Unfortunately, I am old enough to remember how SIEM was done before the arrival of threat intelligence feeds. We had to write broad behavioral (well, “behavioral-ish”, if I am totally honest) rules ...
AttackIQ Bolsters Cyber Defenses with DeepSurface's Risk-Analysis Tech

AttackIQ Bolsters Cyber Defenses with DeepSurface’s Risk-Analysis Tech

This week, AttackIQ acquired DeepSurface to broaden its vulnerability and attack path management capabilities to help enterprises identify and mitigate the most pressing vulnerabilities in their environments. The acquisition enables AttackIQ to ...
Security Boulevard
vulnerability management, thrat, Jenkins CI/CD vulnerability

Taking a Threat Adapted Approach to Vulnerability Management

As cyberthreats grow in complexity and frequency, vulnerability management requires more than just patching systems; it demands a dynamic, threat-adapted approach. As part of Cyber Rhino Threat Week ( December 9-13, 2024) ...
Security Boulevard
Google Cloud Security Threat Horizons Report #11 Is Out!

Google Cloud Security Threat Horizons Report #11 Is Out!

This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our next Threat Horizons Report, #11 (full version) that we just released (the official blog ...