Cyber Threat Intelligence You Can Immediately Understand and Use

| April 26, 2016

article image
The common approach to threat intelligence is to turn on a fire hose of low-level machine-driven data, but this often creates more confusion and more data that is useless for your business. How can you better manage and leverage this cyber data so that you can better equip your business against cyber risks? This brief product overview focuses on a cyber-data analytics solution that transforms data into relevant cyber threat intelligence that can be integrated into any IT environment or application. Read on and discover how this tool can allow your organization to quickly identify and comprehend threats for effective risk management

Spotlight

Torstar Digital (Torstar Corp.)

"Torstar Corporation is a broadly based, progressive media company listed on the Toronto Stock Exchange (TS.B), with a long history in daily and community newspapers, book publishing and digital businesses. Built on the foundation of the Toronto Star, one of North America’s great metropolitan daily newspapers, Torstar has grown into a diversified media company with a growing portfolio of operations in Canada, the United States and around the world. Torstar's approach to digital properties within their media divisions includes owning, partnering and investing in digital companies. Torstar strategically leverages its strengths through a wide variety of business models spread across four categories: content, commerce, consumer and business utility and business solutions."

OTHER ARTICLES

Progress Is the Promise in National Cybersecurity Strategy

Article | March 23, 2020

How can progress be measured when it comes to shifts in national security strategy and practice? Several assessment variables might include changes in official national guidance, legal authorities, types of campaigns or operations, lexicon used in national security discourse, and early results of the application of those changes. Since 2016, with the introduction of the construct of persistent engagement and the subsequent development of defend forward, all these variables have changed in a positive manner.

Read More

Security News This Week: A Tiny Piece of Tape Tricked Teslas Into Speeding Up 50 MPH

Article | February 22, 2020

This week was filled with wide-scale calamity. Hundreds of millions of PCs have components whose firmware is vulnerable to hacking which is to say, pretty much all of them. It's a problem that's been known about for years, but doesn't seem to get any better. Likewise, Bluetooth implementation mistakes in seven SoC—system on chips—have exposed at least 480 internet-of-things devices to a range of attacks. IoT manufacturers will often outsource components, so a mistake in one SoC can impact a wide range of connected doodads. The most troubling part, though, is that medical devices like pacemakers and blood glucose monitors are among the affected tech. YouTube Gaming, meanwhile, wants to take Twitch's crown as the king of videogame streaming. But its most-viewed channels are almost all scams and cheats, a moderation challenge that it'll have to take more seriously if it wants the legitimacy it's spending big money to attain. In another corner of Alphabet's world, hundreds of Chrome extensions were caught siphoning data from people who installed them, part of a sprawling adware scheme.

Read More

5G and IoT security: Why cybersecurity experts are sounding an alarm

Article | March 2, 2020

Seemingly everywhere you turn these days there is some announcement about 5G and the benefits it will bring, like greater speeds, increased efficiencies, and support for up to one million device connections on a private 5G network. All of this leads to more innovations and a significant change in how we do business. But 5G also creates new opportunities for hackers.Gartner predicts that 66% of organizations will take advantage of these benefits and adopt 5G by 2020 — with 59% of them planning to use 5G to support the Internet of Things across their business. Already, manufacturers including Nokia, Samsung, and Cisco have either started developing 5G enterprise solutions or have publicly announced plans to do so. In the enterprise, full deployment of private 5G networks will take time, as it requires significant investments to upgrade legacy network infrastructures, observers say. In the meantime, there are instances of devices in the workplace already operating on a 5G network.

Read More

How Is Covid-19 Creating Data Breaches?

Article | March 30, 2020

Trevor is working from home for the first time. He loves the freedom and flexibility, but doesn’t read his company’s new BYOD policy. Sadly, he misses the fact that his home PC is not protected with updated security software nor the latest operating system patches. Kelcie’s home PC is faster than the old work laptop that she’s been issued to use during the pandemic. She decides to use a USB stick to transfer large files back and forth between her PCs to speed things up. After a few days, she does all her work on her home PC, using a “safe” virtual desktop app. But unbeknownst to her, there is a keylogger on her home PC.

Read More

Spotlight

Torstar Digital (Torstar Corp.)

"Torstar Corporation is a broadly based, progressive media company listed on the Toronto Stock Exchange (TS.B), with a long history in daily and community newspapers, book publishing and digital businesses. Built on the foundation of the Toronto Star, one of North America’s great metropolitan daily newspapers, Torstar has grown into a diversified media company with a growing portfolio of operations in Canada, the United States and around the world. Torstar's approach to digital properties within their media divisions includes owning, partnering and investing in digital companies. Torstar strategically leverages its strengths through a wide variety of business models spread across four categories: content, commerce, consumer and business utility and business solutions."

Events