Recorded Future Blog

Intelligence analysis, industry perspective, product updates,
company news, and more.

Making Your Incident Response Program SOAR With Threat Intelligence (Part 1)

February 21, 2019 • The Recorded Future Team

Learn how SOAR solutions are emerging to provide incident response teams a more effective approach to incorporating automation and threat intelligence.

The Elephant in the Room: A Holistic View of Third-Party Risk

February 20, 2019 • Zane Pokorny

Learn how applying threat intelligence to all security functions helps organizations understand their threat landscape and better manage third-party risk.

What Is Open Source Intelligence and How Is it Used?

February 19, 2019 • The Recorded Future Team

Find out what open source intelligence really is and why having a clear strategy and framework in place for open source intelligence gathering is essential.

The Challenges of Authentication at Scale and Quantifying Risk

February 18, 2019 • Zane Pokorny

Levi Gundert, Recorded Future’s vice president of intelligence and risk, discusses Insikt Group research, what it means to be an ethical hacker, and more.

How to Build Comprehensive Security Processes With Threat Intelligence

February 15, 2019 • Andrew Scott

Andrew Scott explains how creating a plan to use your security tools and staff effectively can help you achieve a proactive threat intelligence program.

Third-Party Risk: Keeping Your Friends Close and Your Enemies Not as Close

February 14, 2019 • Zane Pokorny

Learn about the ways organizations currently measure third-party risk, including top mechanisms used to conduct audits and how effective they actually are.

4 Ransomware Trends to Watch in 2019

February 13, 2019 • Allan Liska

Just as ransomware teams annually adjust their attacks based on the changing security landscape, security teams need to be able to adjust their protections.

How Dragos Protects Industrial Control Systems With Threat Hunting

February 12, 2019 • The Recorded Future Team

At RFUN 2018, Thomas Pope of Dragos explained why threat intelligence for both IT and OT environments is critical for industrial control system security.

The Value Proposition of Finished Intelligence

February 11, 2019 • Zane Pokorny

David Carver explains the best ways to define finished intelligence and shares practical insights based on his experience collaborating with customers.

China’s New Cybersecurity Measures Allow State Police to Remotely Access Company Systems

February 8, 2019 • Insikt Group

Insikt Group explores new cybersecurity provisions issued by the Chinese Ministry of Public Security and what they mean for businesses operating in China.