Stay connected to the latest security news and catch up with the industry’s major players. Our experts cover a broad spectrum of useful security information including in-depth analysis, interviews, and best practices.
Targeted attacks are alive and well. According to the Verizon 2015 Data Breach and Investigations Report, 70% to 90% of malware samples are unique to a single organization. Detection and analysis of unique threat indicators are huge challenges for any organization, especially in a typical enterprise environment with security solutions from multiple vendors. Today’s dynamic threat […]
In Part I of this two-part blog series, we looked at concerns about loss of control and alternatives to all-or-nothing implementations discussed at our recent webinar, “Fireside Chat: Moving to Office 365 with Security in Mind.” In Part II, we address the question: “Can I trust Microsoft with my security?” Once again, security consultant and […]
In their recent 2015 Global Business Technographics® Security Survey, Forrester reports that improving threat intelligence capabilities is a top priority for 71% of enterprises. But enterprises don’t need to improve their ability to gather threat intelligence—the abundance of shared intelligence and threat inputs is already overwhelming for security teams. Operationalizing the intelligence once you have […]
Migration to cloud-based Microsoft Office 365 is on just about everyone’s mind these days. You’re eager to embrace the many benefits of Office 365, but as you consider this big move, your mind is spinning with questions. In this two-part blog series, we’ll look at some of the key issues discussed at our recent webinar, […]
In our previous Blog, we covered how customizing SIEM for threat management requires both resources and expertise. As a result, Intel security created “ready to go” content packs based on Gartner’s Top Use cases. targeting aspiring users to expand their SIEM detection and response use cases without spending countless hours and resources on tuning. Over […]