December 30, 2020 • John Wetzel
SolarWinds breach attribution — are we getting ahead of ourselves by assuming it’s Russia? John Wetzel takes a contrarian view in this blog.
April 16, 2020 • Lindsay Kaye
Lindsay Kaye explains how Insikt Group's operational outcomes team creates actionable insights to reduce the risk associated with an identified threat.
March 19, 2020 • Andrew Scott
Andrew Scott explains how purple teaming allows organizations to identify breakdowns in detective and preventive controls and processes during incidents.
April 4, 2019 • David Peduto
David Peduto explains that while analysts might not be the most visible team members, they are critical to the success of a threat intelligence ecosystem.
March 13, 2019 • Darian Lewis
Darian Lewis, lead threat intelligence analyst at Relativity, reflects on his experience participating in a panel with us at RSA Conference 2019.
March 5, 2019 • Parker Crucq
Parker Crucq explains the elements essential for a relevant weekly threat intelligence report, including notable events, relevant industries, and more.
February 15, 2019 • Andrew Scott
Andrew Scott explains how creating a plan to use your security tools and staff effectively can help you achieve a proactive threat intelligence program.
January 31, 2019 • Marie Brattberg
Marie Brattberg shares an inside look at how the Recorded Future product design team works to build successful user experiences and achieve usability goals.
January 25, 2019 • Alexandr Solad
Alexandr Solad explains that while cloud computing is a widespread and convenient technology, it requires new technological solutions to secure its clients.
January 4, 2019 • Briana Manalo
Briana Manalo explains the key ingredients needed to consistently produce substantial and high-value threat intelligence, however mundane they may seem.
December 1, 2020
November 24, 2020
November 19, 2020
November 17, 2020
November 5, 2020