What is Cyber Threat Intelligence and how is it used?

March 20, 2019

This guide provides an introduction to cyber threat intelligence. It provides practical advice on the practice and procurement of cyber threat intelligence services. It outlines the key concepts and principles that underpin cyber threat intelligence, along with the ways in which organisations use cyber threat intelligence to prevent, detect and respond to potential cyber security incidents. It also presents guidance and criteria to help you select a qualified supplier with the capabilities necessary to meet your requirements.

Spotlight

Silver Spring networks

With more than ten years of experience, Silver Spring Networks is the leader in networking technologies that modernize today’s power grid. We have delivered over 20 million Silver Spring-enabled devices, which our utility partners rely on, in concert with our software and services, to improve energy management and efficiency. Silver Spring securely connects consumers and utility providers through powerful and proven energy networks that can be easily expanded as needs evolve. Our open, standards-based networking solutions enable all energy devices, from in-home energy devices to smart meters to load control devices, to connect together to deliver the highest performance possible. By connecting homes and businesses directly with their local utility, we help everyone manage and integrate renewable energy sources better, bringing greater energy efficiency to the planet and our world – brilliantly.

OTHER WHITEPAPERS
news image

22 Cybersecurity Tips for 2022

whitePaper | June 13, 2022

Many cyber-attacks involve ransomware, a form of malicious software or malware, designed to deny access to a computer system or data until a ransom is paid and a decryption key (commonly called a decryptor) is given to the victim. The encryption is virtually unbreakable without the decryption key, and you should not spend valuable time seeking a way around the encryption if you are attacked with it. Ransomware can spread in multiple ways, but most typically, through phishing emails or by unknowingly visiting an infected website. Ransomware can be catastrophic to healthcare and other organizations, preventing critical information and systems for patient care from being accessed, for example.

Read More
news image

2022 Trends in Securing Digital Identities

whitePaper | August 22, 2022

Managing the ecosystem of identities accessing enterprise resources has only gotten more complicated during the past several years. Between the increasing number of identities, the challenges posed by phishing attacks, and the continued growth of cloud adoption, enterprises are under pressure to ensure the army of remote workers, contractors, and employees accessing network resources are doing so securely and successfully.

Read More
news image

Cybersecurity and Financial SystemResilience Report

whitePaper | July 27, 2022

The Consolidated Appropriations Act, 20211 (CAA) requires the Federal Reserve Board (Board) to submit annually for seven years a report focused on cybersecurity to Congress. The CAA calls for a description of measures the Board has undertaken to strengthen cybersecurity within the financial services sector and with respect to the Board’s functions as a regulator, including the supervision and regulation of financial institutions and third-party service providers.

Read More
news image

How to Reduce the Risk of Phishing and Ransomware

whitePaper | March 21, 2021

Cybersecurity challenges abound for organizations across the world. The tsunami of phishing attacks that threaten account compromise, data breaches and malware infection remains a critical threat to neutralize. Ransomware is a second critical threat, with a well-played ransomware attack capable of bringing an organization to a complete halt, and in some cases putting it out of business permanently (e.g., Travelex1 and Vastaamo2.

Read More
news image

The Definitive WFH Security Checklist: 10 Easy Steps to Safer Remote Access

whitePaper | September 15, 2022

Providing secure, fast remote access is a top priority as the modern workforce has become predominantly remote. Working from home (WFH) or outside the office was once a choice or a stopgap measure, but today, it’s critical for business agility.

Read More
news image

Post-Covid-19: Digital Transformation and OT Cyber Security in Asia

whitePaper | November 2, 2022

Digital transformation has been dramatically accelerated by the Covid-19 pandemic, requiring businesses and operations to quickly set up infrastructures to maintain business continuity. And no part of the network has been impacted more than the OT environment. New systems allow employees to operate from home and for equipment vendors to connect remotely to the network to maintain production. And as we emerge from the pandemic, organisations are now more cognisant of the advantages of scaling their business and operations beyond their traditional network perimeters than ever before.

Read More

Spotlight

Silver Spring networks

With more than ten years of experience, Silver Spring Networks is the leader in networking technologies that modernize today’s power grid. We have delivered over 20 million Silver Spring-enabled devices, which our utility partners rely on, in concert with our software and services, to improve energy management and efficiency. Silver Spring securely connects consumers and utility providers through powerful and proven energy networks that can be easily expanded as needs evolve. Our open, standards-based networking solutions enable all energy devices, from in-home energy devices to smart meters to load control devices, to connect together to deliver the highest performance possible. By connecting homes and businesses directly with their local utility, we help everyone manage and integrate renewable energy sources better, bringing greater energy efficiency to the planet and our world – brilliantly.

Events