There have been several concepts or definitions around what cyber threat intelligence is; Gartner defines it as evidence-based knowledge with the inclusion of mechanisms, implications, context, indicators, and actionable advice against an emerging threat or hazard. It’s an example, and while it is a good definition, the question remains – what does it mean orRead more
Today’s online adversaries possess unprecedented capabilities along with the financial backing, intelligence, and resources to conduct extremely sophisticated attacks. From state-sponsored cyber criminals to orgarnized hackers to other cyber espionage actors, the list of threat actors is large and growing. DOWNLOADRead more
Security isn’t the only thing that’s become better with time. Cyber-attacks are now well-timed, smart, and stealthy. As they say, progress works both ways. Cyber criminals are adept at building tools and utilizing techniques that mask their footsteps, making it difficult for traditional signature-based technologies to identify them. In fact, it’s common for an intrusion to go undetected from its date of origin for days, weeks, or even months.