Category: Opinion

Beavers, Analysts, and the Ecosystem of Threat Intelligence

April 4, 2019 • David Peduto

A personal story will help set the scene for this article My lovely wife and I got married...

Security Panel Insights: Being Asked a Great Question and Not Realizing It Until Later

March 13, 2019 • Darian Lewis

Being a Thought Leader RSA Conference just concluded last week — RSAC 2019, to be exact —...

Threat Analyst Insights: Weekly Threat Intelligence Report Template

March 5, 2019 • Parker Crucq

Monday mornings mark the start of a new week, with a new set of cybersecurity topics and issues for...

How to Build Comprehensive Security Processes With Threat Intelligence

February 15, 2019 • Andrew Scott

As children, many of us played with the classic assortment of blocks, columns, and other shapes...

Putting Usability First: How to Design a Great User Experience

January 31, 2019 • Marie Brattberg

Inspired by companies like SAP, Visma, IBM, and Salesforce talking about their user interface and...

A Look Inside Cloud Computing: Benefits Versus Threats

January 25, 2019 • Alexandr Solad

Cloud computing is the on-demand delivery of IT capabilities in which IT infrastructure and...

Threat Analyst Insights: Eating Your Threat Intelligence Veggies

January 4, 2019 • Briana Manalo

It’s no secret that the most mundane and underwhelming tasks are often the most essential...

An Inside Look at How Insikt Group Produces Leading Threat Research

December 18, 2018 • Maggie McDaniel

in·sight /ˈinˌsīt/ Noun The capacity to gain an accurate and deep intuitive understanding...

How to Reinforce Your Security Operations Center With Threat Intelligence

December 7, 2018 • Nick McNulty

In today’s cybersecurity landscape, security information and event management (SIEM) systems have...

Facts, Assumptions, and Running Estimates in Cyber Threat Intelligence

November 27, 2018 • Dan Bearl

Over the six years since I transitioned from active duty in the US Army to the US Army Reserves and...