Threat Intelligence – Real or Hype?
Threat intelligence, we keep hearing about it from security vendors, but what is it really? Is it hype or marketing speak that will be promoted by those without a real grasp of what it means, or is it the real deal? One problem in defining threat intelligence is that one person’s threat intelligence is not… (0 comment)

Are you wasting money on this common cybersecurity investment?
A wasted investment is the last thing any organization needs, yet the cost of a cybersecurity solution doesn’t necessarily equate to value. Consider Security Information and Event Management, or SIEM tools for example. Dark Reading points out that the tool itself is not the key factor in the effectiveness – it must be properly configured… (0 comment)

Could you have the same vulnerability that led to the Equifax breach?
Regardless of the size of your organization, it’s very likely that you could. Vulnerabilities including the bug reportedly responsible for Equifax’s data breach are still common elements of open-source systems used by developers for creation of business applications and web portals. While this saves time and money on the development side, unless they perform regular… (0 comment)