article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

ThreatQuotient was in this vanguard and helped introduce the use of threat libraries — receptacles for intel coming in from different teams. The idea was to pool intel from all sources, and make it readily available to all teams, so everyone operated off a common knowledge base. “It Threat actors will innovate, of course.

Big data 153
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

Small to Medium Business are, today, the target of APTs and ransomware. MUSIC} VAMOSI: In EP 49, I talked with Huntress, a managed service provider that discovered the ransomware affecting customers of Keysea. And because they were plugged into those clients, they were able to limit the spread of the ransomware.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. An important source of organizational knowledge is either explicit knowledge or tacit knowledge. Explicit knowledge is already classified and is available in a knowledge base, blog, wiki, etc.