Check out Threat Flow, the Security Industry’s First Transparent Generative AI Application

Browser Fingerprint Spoofing: A New Cyber Risk

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Browser Fingerprint Spoofing: A New Cyber Risk." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

If one sure thing exists in the security and privacy area, it’s that cybercriminals will always find ways to use technological advances against users. With the internet as a fundamental communication and commercial technology, data derived from users’ online activities has become more important to businesses and organizations. Most companies use browser fingerprinting for legitimate […]

9 Open Source Threat Intelligence Sources

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "9 Open Source Threat Intelligence Sources." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Keeping up with cybersecurity news is a challenge. From newly discovered vulnerabilities to new attack methodologies, you live a life of “need to know” when ability to find is difficult. As a security professional, knowing is more than half the battle. To stay within your budget, you need the open source threat intelligence resources that […]

Log4j, GitHub Repositories, and Attack Surfaces

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Log4j, GitHub Repositories, and Attack Surfaces." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Numerous security practitioners and software development teams often utilize public repositories in their daily roles. The goal of these public repositories is to help teams collaborate on improving coding, fixing vulnerabilities, and support building high-quality software for companies. Two of the most popular types of these repositories are Log4j and GitHub. These two repositories have been […]

Indicators of Compromise (IOCs) and External Risk Monitoring

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Indicators of Compromise (IOCs) and External Risk Monitoring." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Malicious actors are sneaky. If their tactics, techniques and procedures (TTPs) were obvious, their attacks wouldn’t be successful. Security teams would detect them before they achieved their objectives, and they wouldn’t be able to hide in systems and networks. However, once security professionals identify an attack type, they provide details that other security teams can […]

Preventing and Detecting Data Leaks: The Complete Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Preventing and Detecting Data Leaks: The Complete Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Data leaks have become a growing concern for businesses, governments, and individuals in today’s hyper-connected digital world. In this article, we cover the proven strategies and best practices of data leakage prevention. Understanding Data Leaks Before diving into prevention and detection methods, it is crucial to understand what data leaks are, their potential impact, and […]

Red Teaming Exercise: How Automated Red Teams Enhance Cybersecurity

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Red Teaming Exercise: Automated Red Teams Enhance Cybersecurity" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

In today’s ever-changing threat landscape, employing security-based testing is more important than ever before. As organizations continue to rely on the latest technology to execute their daily business operations successfully, the risk of cyberattacks only continues to increase exponentially. For this reason, countless companies are turning to conducting red teaming exercises against their systems and […]

Security Intelligence: Operationalizing Technical Security

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Security Intelligence: Operationalizing Technical Security," There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat intelligence is a key piece of a proactive cybersecurity strategy. The more business leaders know about threats that might adversely affect your organization, the more quickly they can make decisions to mitigate cyber risk, right?  Not always. Unfortunately, there can be a breakdown between gathering intelligence and an organization acting on that intelligence. This […]

External Threats: The Definitive Guide to Detection and Remediation

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "External Threats: The Definitive Guide to Detection and Remediation" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Every new technology that enables your business also gives threat actors new ways to attack your organization. As your attack surface expands, you can feel overwhelmed trying to mitigate every possible external threat. Today’s external attack surface goes beyond internet ports and web server services, encompassing everything from leaded IT information and credentials to misconfigured […]

What is IT Asset Discovery: A Complete Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "What is IT Asset Discovery? A Complete Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Previously a somewhat trivial and menial task, IT asset discovery is now one of the most pressing challenges companies face from a cybersecurity perspective. Key changes introduced by digital transformation initiatives, cloud adoption, smart IoT devices, and remote work arrangements make it harder than ever to find, catalog, and monitor all of your IT assets.  […]

Top 10 Cyber Threat Intelligence Certifications for 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Top 10 Cyber Threat Intelligence Certifications for 2023." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Cyber threat intelligence certifications can provide important benefits to individuals looking to pursue a career in threat intelligence, or for those who want to advance in their current position. But which certification is best, and how should professionals go about getting certified?  How Cyber Threat Intelligence Certifications Can Add to Your Career Obtaining a cyber […]