Threat Intelligence Portfolio Maximize the value and impact of your threat intelligence

July 16, 2019

Cyber attackers are often better trained, better funded and better organized than many security organizations. Cyber attacks are increasingly more complex and the damage more severe. For these reasons, more organizations are looking to reduce their risk and augment their security with external threat intelligence services. However, many organizations don’t know where to start, while others have jumped right in without understanding what threat intelligence they need or how it should be used. The results are generally ineffective and costly.

Spotlight

Smith Micro Software, Inc

Smith Micro (NASDAQ: SMSI) creates proven software solutions for a mobile world. In doing so, we solve acute business challenges for some of the leading global wireless service providers, Cable/MSOs, mobile device and chipset manufacturers around the world. In addition to our wireless solutions, we create industry-leading graphics software for animators, illustrators, graphic designers and students. These products help to fuel the market with rich, animated cartoons, films and motion comics, while our wireless solutions facilitate convenient content consumption by improving the efficiency and effectiveness of the networks, devices and apps that enable our ‘mobile-first’ global society.

OTHER WHITEPAPERS
news image

NMS Security Architecture Considerations & Approaches

whitePaper | August 26, 2022

The SolarWinds compromise became public in December 2020 and was a massive wake up to the industry. Likely a state-sponsored attack, it compromised potentially thousands of governments and other high-profile organisations across the globe. Many organisations are currently in damage control following the breach. Many of them are unsure if the perpetrators have entered, spread and are still persistent within their environment - even after they shut down the SolarWinds Platforms.

Read More
news image

Cloud Collaboration Security Technical Paper Series: Webex Messaging

whitePaper | December 17, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. This paper describes the architecture and security features related to the Webex Messaging service and the suite of tools that the Webex Messaging service provides to keep customers’ data safe from Cisco as well as external attackers.

Read More
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More
news image

2023 Hybrid Cloud Security Survey

whitePaper | June 26, 2023

While we are witnessing a modest slowdown in cloud migration due to rising costs and economic uncertainty, it remains that a multitude of organizations now have a hybrid infrastructure in place. According to Forrester analysts,1 this is deemed very much the norm and reports show 72 percent of organizations exist in the hybrid cloud.2 This is because enterprises will likely have paired their own data center/private cloud with one or more public clouds as a result of acquisition or to reap a number of benefits: Cisco, for example, identified 42 percent of organizations believe they achieve a more agile and scalable development environment within the hybrid cloud, alongside 40 percent who realize accelerated business agility and innovation.3

Read More
news image

GE Gas Power Cybersecurity Portal

whitePaper | October 31, 2022

GE Gas Power has developed a product security program based on industry-leading standards, encompassing end-toend cybersecurity through the entire software development lifecycle in conjunction with engineering, sourcing, and vulnerability and incident response. As part of this program, we have also created the Gas Power Cybersecurity Portal, a central, publicly available resource regarding cybersecurity at GE Gas Power.

Read More
news image

How to Prepare For & Respond to Ransomware in Operational Technology Environments

whitePaper | March 14, 2023

Targeted intrusions for gaining long-term access and collecting data about industrial control systems (ICS) are becoming much more frequent. Many of these attacks are about understanding the network and preparing for future activities without causing any immediate impact. The most recent Dragos Year in Review6 report shows that the ransomware groups Lockbit 2.0 and Conti were responsible for more than half of the observed ransomware attacks in industrial environments in 2021, and that these instances resulted in actions on objectives. These attacks have been observed in almost every industrial vertical, primarily targeting small to medium-sized organizations in manufacturing.

Read More

Spotlight

Smith Micro Software, Inc

Smith Micro (NASDAQ: SMSI) creates proven software solutions for a mobile world. In doing so, we solve acute business challenges for some of the leading global wireless service providers, Cable/MSOs, mobile device and chipset manufacturers around the world. In addition to our wireless solutions, we create industry-leading graphics software for animators, illustrators, graphic designers and students. These products help to fuel the market with rich, animated cartoons, films and motion comics, while our wireless solutions facilitate convenient content consumption by improving the efficiency and effectiveness of the networks, devices and apps that enable our ‘mobile-first’ global society.

Events