Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Impact of Cloud Computing on Threat Intelligence

The advent of cloud computing has revolutionized various industries, with cybersecurity being no exception. In the realm of threat intelligence, cloud computing has emerged as a game-changing force, enhancing the way intelligence is gathered, analyzed, and applied. This post delves into the transformative impact of cloud-based solutions on threat intelligence.

Threat Intelligence and Data Privacy: Balancing Security with User Rights

In today’s digital age, cybersecurity is an ever-present concern for businesses and individuals alike. The use of threat intelligence has become a cornerstone in the fight against cyber threats, offering invaluable insights for preventing attacks. However, this comes with its own set of challenges, particularly in terms of maintaining data privacy standards. This guide explores the delicate balance between leveraging threat intelligence for security and upholding user data privacy rights.

Risk Mitigation for Organizations: The Complete Guide

Running a business involves taking calculated risks — but unexpected events can have devastating consequences. Risk mitigation is a process that helps companies identify potential risks and take proactive measures to mitigate them. In this blog, we'll explore the importance of risk mitigation and how businesses can protect their assets, reputation, and financial stability.

An Analysis of Menorah Malware

SecurityScorecard is analyzing a phishing campaign that deployed the Menorah malware, which is taking aim at users in the Middle East. This sophisticated campaign is being mounted by the threat actor group tracked as APT34, which is linked to Iran. This group is known for its focus on collecting sensitive intelligence and taking on high-profile targets across the Middle East including critical infrastructure and telecommunications entities.

Navigating the 2024 Cybersecurity Conference Maze

As the digital landscape evolves, so too must the professionals who safeguard it. Cybersecurity conferences are invaluable when it comes to networking, learning, and staying ahead of the ever-evolving threats. Whether you’re a seasoned cybersecurity professional or a newcomer to the field, attending these conferences can be a transformative experience.

Blockchain Security

The blockchain has emerged as a revolutionary technology with the potential to redefine how data is managed, stored, and shared. While initially associated with cryptocurrencies like Bitcoin, the blockchain’s applications extend far beyond finance, impacting industries ranging from healthcare to supply chain management. One of the blockchain’s key promises lies in ensuring data consistency, transparency, and privacy, critical elements in an interconnected and data-driven world.

How to Operationalize Vulnerability Threat Intelligence

With so many vulnerabilities to address and potential threats looming, how can organizations prioritize and respond effectively? Enter Vulnerability Threat Intelligence (VTI). This knowledge not only aids in pinpointing vulnerabilities but also shapes strategies for risk acceptance and rapid responses to zero-day threats. Join our webinar where Patrick Garrity from Nucleus Security, Caleb Hoch from Google, and Jared Semrau from Mandiant, uncover how to effectively leverage vulnerability threat intelligence (VTI).

The New Normal For Cybersecurity Practitioners

Former UBER CSO Joe Sullivan joined SecurityScorecard CEO Aleksandr Yampolskiy to discuss pressing topics on the mind of every CISO. Are we on the verge of entering the "Golden Era" of cybersecurity? SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.

Applying the Churchill Knowledge Audit to Cybersecurity

When FedEx founder Fred Smith attended Yale in the mid-1960s, he wrote an economics paper describing the concept of overnight delivery of packages by air. His professor infamously gave him a “C” grade because he viewed it as implausible. But Smith knew something his professor didn’t—and it was an idea that would change the way the business world worked forever. I bring this story up for two reasons. For one thing, I worked for FedEx and learned a lot from my time there.