Tag "Threat Intelligence"

Back to homepage
Hardware/Network

Overcoming Common SD-WAN Security Mistakes

Digital transformation is about much more than moving workflows to the cloud and adopting IoT. It is about retooling the entire network to make it faster, more efficient, much more

Hardware/Network

Don’t Dwell On It: How to Detect a Breach on Your Network More Efficiently

Almost every day, there seems to be a new headline about a high-profile data compromise. But the incidents we hear about only make up the tip of the iceberg —

Hardware/Network

Deflecting DDoS – Key Tactics in the Battle Against IoT-Powered Attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that

Hardware/Network

How To Close Security Gaps With A Threat Intelligence Library

Companies have invested in protection technologies for decades – firewalls, web and email security gateways and endpoint protection. Over time, these technologies have increasingly relied upon threat intelligence to create

Hardware/Network

How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries

Finding a needle in a haystack is hard, but it’s nothing compared to finding a single piece of hay in the haystack that was put there with malicious intentions.As Verisign

Software

The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion

The Necurs botnet, a large and well-known spam originator, has become synonymous with cybercrime. Its spam-sending capabilities, through a botnet of a few million infected devices, are frequently dedicated to

Industry Insights

8 Ways To Empower Your Security Operations Center

When it comes to building a security operations center (SOC), it can be hard to know where to start. Even if you’re making sure the security operations team you already

Software

Organisations are beginning to find cyber threats more effectively

On the final day of Information Age’s Cyber Security Month, it has emerged that organisation’s are beginning to find threats more effectively. Some good news! ‘One of the most notable

Hardware/Network

SIEM Guide: A Comprehensive View of Security Information and Event Management Tools

A security information and event management system, or SIEM (pronounced “SIM”), is a security system that ingests event data from a wide variety of sources such as security software and

Hardware/Network

What Your Organization Needs To Know To Undergo A Secure Digital Transformation

Just about every company today is going through some type of digital transformation, whether migrating entire departments and data centers to the cloud, opting for cloud-based SaaS solutions over legacy, on-prem software,