Cyber Threat Intelligence Feeds: The Top 20 Sources Of Actionable Cyber Intelligence

cybersecuritylock

The discipline of cyber threat intelligence focuses on providing actionable information on adversaries. This information is becoming increasingly important to enterprise cyber defense. This importance has resulted in investment and creation of many new/innovative sources of information on threat actors. This brings challenges of its own. How do you know which source to turn to for […]

The 2014 FedCyber Event will be 5 November 2014: Register now to ensure your seat

fedcyber

FedCyber is an annual cybersecurity event hosted by Matt Devost and Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. This event us unique in the DC ecosystem. We are focused on enabling people who make a difference in things cyber. We serve the community […]

Cyber Response Solutions: A taxonomy of response, recovery, restoration and remediation tools

cyberresponsesolutions

The National Institute of Standards and Technology (NIST), working collaboratively across a broad range of stakeholders, released a Cybersecurity Framework in February 2014. This framework, based on the functions of Protect, Detect and Response, has been adopted as a common model for actions for highly performing cyber security operations. The response portion of the cybersecurity […]

Security Innovation Network SINET 16 Application Process Now Open

SINET_logo_for_twitter

We have previously written about the Security Innovation Network (SINET) and the yearly SINET Showcase.  This is a group every technology firm should have some familiarity with now. Startups should track SINET as a way to learn and perhaps expose your technology to the community. Established security firms should track SINET to learn of emerging […]

Tapping Global Threat Intelligence To Secure Enterprise Networks

cyber-human-face-blue

Tapping Global Threat Intelligence To Secure Enterprise Networks Cyber Security Symposium August 27, 2014 | 11 AM -1:30 PM EST Ruth’s Chris Steakhouse, Arlington, VA For more and to register see: http://ctolink.us/1nKbQqy On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. The legislation encourages threat information […]

More Questions than Answers from Data Breach Report

internet-of-things-2

The American media has never paid more attention to data breaches and cybersecurity than it does today. Major breaches in the last year – at large companies like Target and eBay – have made information security discussions more worrying and more widespread, albeit still not universally understood. On August 5th, Nicole Perlroth and David Gelles […]