home.aspx
 
EVENTS

Closing the Threat Intelligence Effectiveness Gap
CLOSING THE THREAT INTELLIGENCE EFFECTIVENESS GAP
February 27-27, 2019
In a recently released Ponemon Institute report, "The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies," the importance of threat intelligence in achieving a strong cybersecurity posture is rated as very high at 85%, but only 41% of respondents fe...

Anomali


Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

RELATED NEWS


Cyber-security startup Acceptto is set to officially emerge from stealth on Nov. 27, bringing to market its' new approach to reducing identity fraud with a cognitive authentication platform. The foundation of Acceptto's platform is the company's eGuardian engine which enables the cognitive authentication capabilities. With cognitive authentication, rather than relying on usernames and password or simple token based multi-factor authentication, Acceptto is looking to build a resilient...
EWEEK
READ MORE

Webroot  the market leader in next-generation endpoint security and threat intelligence, today announced it has acquired the assets of CyberFlow Analytics, an innovator in applying data science to network anomaly detection. This acquisition enhances Webroot’s ability to address the explosion of internet-connected devices and an increasingly complex threat landscape. Adding the FlowScape network behavioral analytics solution extends Webroot’s leadership in machine learning-based ...
WEBROOT
READ MORE

ARMONK, N.Y. - 06 Dec 2016: IBM Security (NYSE: IBM) today announced that global leaders in banking, healthcare, insurance, education and other key industries have joined the IBM Watson for Cyber Security beta program. Sun Life Financial, University of Rochester Medical Center, Avnet, SCANA Corporation, Sumitomo Mitsui Banking Corporation, California Polytechnic State University, University of New Brunswick and Smarttech will be amongst 40 organizations testing Watson’s ability to assist i...
IBM SECURITY
READ MORE

The following is an excerpt from Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data by authors Mark Ryan Talabis, Robert McPherson, Inez Miyamoto and Jason L. Martin and published by Syngress. This section from chapter 7 explores security intelligence....
SEARCHSECURITY.TECHTARGET
READ MORE

One of the co-founders of the tight-lipped cybersecurity firm Darktrace peeled back some of the secrecy around the company today at TechCrunch Disrupt London, describing how investor Mike Lynch brokered a meeting between Cambridge mathematicians and spies at the British intelligence agency GCHQ to found the company. Lynch, who is currently embroiled in a lawsuit and countersuit with Hewlett-Packard over its acquisition of his company Autonomy in 2011, introduced the spies to mathematicians at Ca...
TECHCRUNCH
READ MORE

It goes on to add, "Please tell Microsoft about this problem. This information may be intercepted by a foreign SIGINT system to gather detailed information and better exploit your machine."  There is, however, a more positive use of crash reports. Websense has today published a new whitepaper titled Using Anomalies in Crash Reports to Detect Unknown Threats. The paper has grown out of an earlier report, released almost simultaneously with Spiegel's NSA report, which had noted,...
INFOSECURITY-MAGAZINE
READ MORE

Malicious actors breached an organization’s systems and maintained persistent control over its network for months via an Internet-facing webmail server.The attack was analyzed in detail by Cybereason, a company that provides real-time cyber attack detection and response solutions. The security firm launched an investigation after one of its customers’ security team spotted anomalies on a server.Cybereason has not named the targeted organization in its report, but told SecurityWeek th...
SECURITYWEEK
READ MORE

EVENTS

Closing the Threat Intelligence Effectiveness Gap
CLOSING THE THREAT INTELLIGENCE EFFECTIVENESS GAP
February 27-27, 2019
In a recently released Ponemon Institute report, "The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies," the importance of threat intelligence in achieving a strong cybersecurity posture is rated as very high at 85%, but only 41% of respondents fe...