The Many Faces of Threat Intelligence Part 1: Identifying the Problems

the-many-faces-of-threat-intelligence-part-1:-identifying-the-problems

Threat intelligence data has become more and more crucial to effective enterprise security practices. Threat intelligence solutions gather raw data and indicators about existing and emerging threat actors and threats. This data is then analyzed with the hope of informing and preparing organizations for cybersecurity risks like zero-day risks, threat actor attacks, advanced persistent threats, and the exploitation of known vulnerabilities. Many organizations view threat intelligence exclusively in this context.

read more

Three Ways to Defeat Ransomware

three-ways-to-defeat-ransomware

Ransomware is very difficult to stop, mostly because the attackers are adept at locking up a network long before anybody in an organization even sees a ransom note.  In many attacks, the malware combines an encryption payload with automated propagation. 

read more

In the Hacker’s Crosshairs: K-12 Schools

in-the-hacker’s-crosshairs:-k-12-schools

In education, cybersecurity is rarely top-of-mind — until a major incident occurs. Yet, according to the Federal Bureau of Investigation (FBI), schools are top targets for cybercriminals, resulting in ransomware attacks, data theft, and the disruption of online learning.

read more