Quantcast
Channel: Threat Intelligence Archives | TechSpective
Browsing latest articles
Browse All 10 View Live

Jack Danahy Shares Insight on Endpoint Protection and Simplifying Cybersecurity

Inner Circle Podcast Episode 026 This week I am joined on the Inner Circle podcast by Jack Danahy, Senior Vice President of Security for Alert Logic. As most of you know, I also work for Alert Logic by...

View Article



Greater Transparency Leads to Better Cybersecurity

The threat landscape is constantly evolving, and organizations of all sizes are essentially under siege. Effective cybersecurity is essential but evaluating and selecting cybersecurity solutions is...

View Article

Jamil Jaffer Chats about the Value of Sharing Threat Intelligence for Better...

Inner Circle Podcast Episode 030 My guest for this episode of the Inner Circle podcast is Jamil Jaffer, Vice President for Strategy & Business Development at IronNet Cybersecurity. We discuss a...

View Article

Survey Finds Many SOCs are Set Up to Fail

Devo is a sponsor of TechSpective At face value, the idea of a security operations center (SOC) makes tremendous sense. What organization wouldn’t want a team of dedicated cybersecurity professionals...

View Article

Protecting the ‘Crown Jewels’ with Threat Hunting

Qualys is a sponsor of TechSpective Cyber attacks target vulnerabilities. That is a simple, common sense reality that shouldn’t need to be pointed out. However, organizations often struggle to patch...

View Article


Improving and Automating Threat Intelligence for Better Cybersecurity

Devo is a sponsor of TechSpective Cybersecurity is challenging. It is a daunting exercise to protect a complex hybrid cloud infrastructure from a rapidly evolving and expanding threat landscape....

View Article

Maggie MacAlpine Chats about Collaborative Threat Intel Initiative

TechSpective Podcast Episode 099   Do you like to do jigsaw puzzles? I generally don’t have the patience, but my wife is a jigsaw puzzle fanatic. Gathering threat intelligence is a lot like assembling...

View Article

Mark Thomas Talks about Threat Hunting

TechSpective Podcast Episode 101   There are many facets to cybersecurity. Organizations seek to prevent or block as much as possible, while also constantly monitoring their environments, and–in most...

View Article


Using Machine Learning to Help Detect Sensitive Information

By Wilson Tang, Machine Learning Engineer in Threat Hunting As a large, global organization with thousands of employees, Adobe creates and exchanges countless documents every day. These documents can...

View Article


Using LLMs to Automate and Streamline Cyber Threat Analysis

TechSpective Podcast Episode 122   There are a number of steps involved in cyber threat analysis to review event information and determine which events are benign or innocuous and which are...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images