Threat Intelligence Is the SOC’s Road Map to DNS Security

Remember the nervousness and excitement you felt when you took your driving test? You had to practice for weeks, complete the required paperwork and study countless traffic signs. The latter is especially important because these signs are used to warn and guide drivers. In cybersecurity, like in driving, the earlier…

Read More

Why Security Incidents Often Go Underreported

If you saw a coworker browsing through a database they weren’t supposed to have access to, would you report it? What would you do if you accidentally clicked on a link in a phishing email? Most people would say they’d do the right thing and let the IT or security…

Read More

Take a Proactive Approach to the Darknet Threat

Imagine this scenario: Everyone in your accounts payable department receives an invoice for a service your organization uses frequently. The invoice appears legitimate and doesn’t set off any alarm bells, but is in fact loaded with malware purchased on the darknet — a popular marketplace for tools that can be…

Read More