Remove threat-intelligence
article thumbnail

Remembering Vitali Kremez, Threat Intelligence Researcher

Data Breach Today

The renowned threat intelligence expert, born in Belarus, had long tracked Russian cybercrime syndicates and was part of an ad hoc group established to counter ransomware and help victims.

article thumbnail

Insights From INTERPOL on Using Threat Intelligence

Data Breach Today

Cybercrime Fighter Offers Advice on Responding to the Latest Trends Craig Jones, who leads the global cybercrime program for INTERPOL, which facilitates police cooperation among 194 member nations, describes how organizations can improve their use of threat intelligence.

297
297
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Sophos X-Ops advances internal, external threat intelligence sharing to the next level

The Last Watchdog

Threat intelligence sharing has come a long way since Valentine’s Day 2015. Material progress in threat intel sharing, indeed, has been made. Overcoming inertia Threat actors haven’t been exactly sitting on their laurels. Members proactively share information on emerging threats, malware samples and attack patterns.

article thumbnail

US Intelligence Ranks China as Top National Security Threat

Data Breach Today

Beijing Regularly Employs Cyber Operations and Economic Espionage, Assessment Warns The Chinese government's geopolitical ambitions and willingness to use cyber operations to achieve them pose one of the biggest threats to U.S. intelligence community warns. national security, the U.S.

Security 144
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

This guide shows companies how to build out their geopolitical risk analysis – and how threat intelligence data can help supplement the analysis. How can you track geopolitical risk? And what data can you use to visualize the risk to your company? Download Now!

article thumbnail

How Threat Intelligence Feeds Are Evolving

Data Breach Today

Rob Cataldo of Kaspersky Discusses Bringing Context to Threat Intelligence Threat intelligence feeds are evolving, but Rob Cataldo of Kaspersky North America says it's important to put all this data into context to create better enterprise security.

Security 194
article thumbnail

AI Infused with XDR, SIEM, and Threat Intelligence Set to Reshape Cybersecurity

Data Breach Today

Yet when incidents occur, threat data from siloed platforms can take hours or days to gather, analyze and act upon. Correlating threat data takes time, as does developing the right remediation plans, stopping the attack, and sharing the results with colleagues.