MATURING A THREAT INTELLIGENCE PROGRAM

January 24, 2019

The threat intelligence landscape is an emerging one. Even in the most sophisticated security organizations, resource constraints often dictate that threat intelligence (TI) is the responsibility of a sole analyst sifting through incident alerts looking for patterns and trends which may indicate that a threat exists.

Spotlight

Sense

At Sen.se, we believe there is no such thing as the Internet of Things.We rather believe in an Internet of Everything where Humans, Nature, Machines, Objects, Environments, Information, Physical and Virtual spaces all mix up, talk, intertwine, interact, enrich and empower each other in all sorts of ways. This is what we are building and we think that we are not alone.This is why we have created Open.Sen.se an open platform for all those who want to imagine, prototype and test new Devices, Installations, Scenarios, Applications for this globally interconnected and immersive world. Designers, developers, tinkerers, students, hobbyists, R&D departments, artists, self quantifiers, dataviz maniacs, whatever your skills are, we tried to make Open.Sen.se easy to use and yet powerful for you.

OTHER WHITEPAPERS
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

Supply Chain Security in MongoDB’s Software Development Lifecycle

whitePaper | May 25, 2022

Cybersecurity breaches do more than expose data to malicious actors. They generate headlines, captivate the public’s attention, and shine a light on security gaps. Whether it’s weak passwords or the software supply chain, if a vulnerability exists, cybercriminals will exploit it.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’

whitePaper | February 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention and action from CISOs, CIOs, and business executives. As a result, 62% of organizations plan to increase cybersecurity spending in 2020.2 Here’s the problem: Increasing security budgets alone isn’t enough. CISOs need quick and easy wins that can greatly bolster security efficacy and streamline operations without demanding massive projects and vast resources. There is a lot of work ahead. This white paper concludes.

Read More
news image

2022 Trends in Securing Digital Identities

whitePaper | August 22, 2022

Managing the ecosystem of identities accessing enterprise resources has only gotten more complicated during the past several years. Between the increasing number of identities, the challenges posed by phishing attacks, and the continued growth of cloud adoption, enterprises are under pressure to ensure the army of remote workers, contractors, and employees accessing network resources are doing so securely and successfully.

Read More
news image

Cross-Generational Security Of Mobile Telephony

whitePaper | August 4, 2022

Abstract— With the recent roll-outs of 5G networks and the rise of phones supporting the standard, it’s critical to examine the technical underpinnings of 5G system security. The fifth generation of 3GPP (3rd Generation Partnership Project) mobile telephony, the lack of understanding, outright hostility, and general confusion surrounding this roll-out is unmatched in the history of mobility. We aim to alleviate much of the confusion and hostility by providing an overarching description and security document.

Read More

Spotlight

Sense

At Sen.se, we believe there is no such thing as the Internet of Things.We rather believe in an Internet of Everything where Humans, Nature, Machines, Objects, Environments, Information, Physical and Virtual spaces all mix up, talk, intertwine, interact, enrich and empower each other in all sorts of ways. This is what we are building and we think that we are not alone.This is why we have created Open.Sen.se an open platform for all those who want to imagine, prototype and test new Devices, Installations, Scenarios, Applications for this globally interconnected and immersive world. Designers, developers, tinkerers, students, hobbyists, R&D departments, artists, self quantifiers, dataviz maniacs, whatever your skills are, we tried to make Open.Sen.se easy to use and yet powerful for you.

Events