Security and Vulnerability Management

Security and vulnerability management

breach detection hacker hacked thief

Facebook’s Threat Intelligence Sharing Potential

Data management, scale, and algorithmic strengths may give Facebook an advantage in threat intelligence sharing


Incident Response: More Art than Science

Cybersecurity industry needs to establish best practices and open secure channels for incident response communications.

Enterprises are Analyzing Lots of Internal Cybersecurity Data

Enterprise organizations collect, process, and analyze a wide variety of cybersecurity data, and there is no end in sight.

Black Hat Boogie

My quick takes on an interesting, exhausting, and frightening week at Black Hat 2015 in Las Vegas

Black Hat Is About Cybersecurity People and Processes

Cybersecurity professionals attending Black Hat can gain in-depth knowledge about good guys, bad guys, and everyone in between

Cybersecurity Technology Integration Changes Everything

Based upon current and future cybersecurity technology integration trends, CISOs are adjusting budgets, organizations, skills, and vendor choices. Even industry analysts are impacted by cybersecurity technology integration.

parallels logo

Managing Apple Macs and Windows Systems with the Same SCCM Tool

Parallels releases latest in add-ons to Microsoft's System Center Configuration Manager to better manage Apple Macs in an integrated Windows environment.

Measuring the Quality of Commercial Threat Intelligence

One person’s quality is another person’s fluff so objective measurements will be difficult. Threat intelligence quality may ultimately be gauged through crowdsourcing and threat intelligence sharing.

Are There Differences Between Threat Intelligence Feeds?

Enterprise cybersecurity professionals find it difficult to judge the quality and efficacy of disparate open source and commercial threat intelligence. In the short term, this means more buying and selling.

Distil a deluge of threat information to respond in minutes, not months

We know the indicators of compromise, but are they relevant to your organization? BrightPoint says it can tell you in minutes if you are under attack

Enterprise Threat Intelligence Programs are Immature

Work ahead to operationalize and share threat intelligence

hole brick wall

Why are there still so many website vulnerabilities?

The battle lines are drawn between the enterprise URL and the cyber mercenaries taking up ranks on the other side of the Internet. Are you ready?

police car in rear view mirror 000000773431

Using third-party vendors? Keep a close eye on them

Infosecurity is only as strong as the weakest link, and these days all eyes are on third-party vendor risk management.

Toward Omniscient Cybersecurity Systems

CISOs need an all-knowing central system to truly address their cybersecurity monitoring, diagnostics, and operations needs

Valuable Federal Cybersecurity Training for Critical Infrastructure Organizations

Little known ICS-CERT program provides free cybersecurity training for infosec professionals and gets rave reviews

Federal Cybersecurity Carrots and Sticks

Critical infrastructure cybersecurity professionals want to see more government incentives and harsher penalties.

Cybersecurity, Critical Infrastructure, and the Federal Government

Security professionals working at critical infrastructure organizations are unclear about US government’s cybersecurity strategy and want to see more federal participation

cutcaster 901483111 anti terror police force small

What can the military teach us about cybersecurity?

Teaching the workforce to create a heightened state of awareness.

estonia lead image

An entire country's data is getting backed up

The country of Estonia is backing up its entire government dataset, and also devising ways to operate through the cloud in the event of an attack by a foreign nation. Its neighbor is Russia.

Load More