• We’re Hiring
  • Request Demo
  • Support
  • Login
  • Product keyboard_arrow_down
  • Solutions keyboard_arrow_down
  • Customers
  • Partners
  • Blog
  • Resources keyboard_arrow_down
  • Get started arrow_forward
  • Product
  • apps
    Overview
    Learn more about threat intelligence powered by machine learning
  • blur_on
    Technology
    See how collection from an unrivaled breadth of sources powers risk insights
  • developer_board
    Integrations
    Combine threat intelligence with your existing security technology
  • announcement
    Services
    Let our team of world-class analysts help you apply threat intelligence
  • device_hub
    API
    Connect to our real-time threat data through a flexible rest API
  • create
    Training
    Become an expert in threat intelligence through our educational programs
  • Solutions
    people By Role
  • Incident Response
  • Security Leadership
  • Security Operations
  • Threat Analysis
  • Vulnerability Management
  • extension By Need
  • Brand Monitoring
  • Dark Web Monitoring
  • Indicator Enrichment
  • Threat Hunting
  • Threat Intelligence Platform
  • Threat Intelligence Feeds
  • business By Industry
  • Energy
  • Financial Services
  • Government
  • Healthcare
  • Retail
  • Resources
  • email
    Cyber Daily
    Join over 35,000 subscribers who get daily threat insights by email
  • mic
    Podcasts
    Listen to our podcast to supercharge your threat intelligence knowledge
  • ondemand_video
    Webinars
    Watch live and on-demand webinars to hear from industry experts
  • chrome_reader_mode
    White Papers
    Read our white papers to keep up with the latest threat intelligence advice
  • how_to_reg
    Grader
    Take this short survey to assess your threat intelligence maturity
  • menu
    close
    • Product
      • Overview
      • Technology
      • Services
      • Integrations
      • API
      • Training
    • Solutions
      • Threat Analysis
      • Security Operations
      • Incident Response
      • Vulnerability Management
      • Security Leadership
      • Indicator Enrichment
      • Brand Monitoring
      • Threat Hunting
      • Cyber Risk Trends
      • Threat Intelligence Feeds
      • Financial Services
      • Healthcare
      • Retail
      • Energy
      • Government
    • Customers
    • Partners
    • Resources
      • Cyber Daily
      • Webinars
      • Podcasts
      • White Papers
    • Login
    Blog Posts

    Recorded Future Blog

    Intelligence analysis, industry perspective, product updates, company news, and more.
    Threat Analyst Insights: Behind the Scenes of On-Demand Research

    A Recorded Future analyst shares how a combination of technical and non-technical assessments ensures the delivery of timely and accurate customer reports.

    Opinion
    3 hours AGO
    Anissa Wozencraft
    How Strategic Threat Intelligence Informs Better Security Decisions

    Strategic threat intelligence is a bird’s-eye view of an organization’s threat landscape that helps high-level strategists make better business decisions.

    Cyber Threat Intelligence
    21 hours AGO
    The Recorded Future Team
    3 Ways Threat Intelligence Saves Time and Money

    Research from IDC found that organizations saw huge time and money savings after adding threat intelligence into their already existing security systems.

    Cyber Threat Intelligence
    3 days AGO
    Zane Pokorny
    Protecting the Brand, Products, and People at Perdue Farms

    Chris Wolski, head of information security at Perdue Farms, describes the unique intersection of cyber and physical systems his team protects.

    Company
    4 days AGO
    Amanda McKeon
    Collaborate Confidently With Analyst Notes in Recorded Future

    Analyst Notes is a feature in Recorded Future that allows teams to collaborate with each other through private notes visible only within their organization.

    Product
    1 week AGO
    Avia Navickas
    4 Ways Machine Learning Produces Actionable Threat Intelligence

    A big challenge in collecting and analyzing threat intelligence has always been scalability. Learn how applying machine learning techniques can help.

    Cyber Threat Intelligence
    1 week AGO
    Zane Pokorny
    Russia's Vulnerability Database Focuses Inward

    Recorded Future’s research team recently set their sights on Russia’s vulnerability database to see how it compares to China and the United States.

    Company
    1 week AGO
    Amanda McKeon
    Applying Improv Techniques to Threat Intelligence

    Improv is about dealing with the unexpected and doing the seemingly impossible. As a threat intelligence practitioner, you need to be well versed in both.

    Cyber Threat Intelligence
    2 weeks AGO
    David Peduto
    1 2 3 … 132 Next »
    list
    Categories
    1. Analysis
    2. Company
    3. Product
    Copyright © 2018 Recorded Future, INC.
    Product
  • Overview
  • Technology
  • Integrations
  • Services
  • API
  • Resources
  • Blog
  • Cyber Daily
  • Podcasts
  • Webinars
  • White Papers
  • Company
  • About
  • Events
  • Press
  • Contact
  • Jobs
  • Information
  • Support
  • FAQ
  • Terms
  • Privacy
  • Cookies
  • Copyright © 2018 Recorded Future, INC.
    closeclose