The end of 2019 is rapidly approaching, and with the coming of a new year comes the perfect opportunity to reflect on the past and plan for the months ahead. What will 2020 bring when it comes to cybersecurity and what can users do to ensure
SOAR vs. Security Operations: What’s Really Going On?
POSTED BY JOHN CZUPAK
There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of useful
Since the early ‘90s, Linux has been a cornerstone of computer operating systems. Today, Linux is everywhere — from smartphones and streaming devices to smart cars and refrigerators. This operating system has been historically less susceptible
Put Together a Winning Game Plan Against Adversaries with MITRE ATT&CK
POSTED BY CYRILLE BADEAU
We recently held a seminar demonstrating how the MITRE ATT&CK framework can be leveraged across an entire cybersecurity practice.
Making Use of Cyber Attribution Reports
POSTED BY ROSS HAMMER
Having recently read the Office of Director of National Intelligence’s (ODNI’s) “A Guide to Cyber Attribution,” I began to think of ways ThreatQ can help analysts use
Leveraging CTI to benefit organisations’ security posture
POSTED BY ANTHONY PERRIDGE
One out of five companies are unsure of the value cyber threat intelligence can bring to their organisation.
Over the last year, we have seen the
Over the years, our lives have become more and more digital. Think about it: 20 years ago, no one was using banking apps and social media had just barely begun coming to fruition. Now, many of us are reliant on mobile banking to pay our bills
What Financial Services Institutions Should Know About Social Media Risk
POSTED BY LIZ BUSH
Three out of four banking customers surveyed agree or strongly agree that social media is important to their banks, with Facebook, LinkedIn,
Logging onto a free Wi-Fi network can be tempting, especially when you’re out running errands or waiting to catch a flight at the airport. But this could have serious cybersecurity consequences. One popular Android app, which allowed anyone to
How often do you check your social media accounts? According to a recent study, internet users spend an average of 2 hours and 22 minutes per day on social networking platforms. Since users are pretty reliant on social media, cybercriminals use