Who Took The Cookies From The Cookie Jar? The indictment of five Iranian hackers three years after the fact raises the question: Is naming them a worthwhile part of the threat defense lifecycle, or is it a meaningless distraction? Data In The Cloud: What Everyone Should Know When vetting a cloud or SaaS provider, it is imperative that you find out how they handle data security and privacy. Here are some key questions to ask. Knowledge Gap Series: The Myths Of Analytics It may not be rocket science, but it is data science.
Join us for this webinar in which we will demonstrate how the right process paired with the right threat intelligence platform (TIP) are key in automating resource intensive aspects when running a threat intelligence team.
Join us for a webinar where we will explain why threat intelligence itself has become a big data problem and how the number of active indicators of compromise has grown into the tens of millions.
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.