Sponsored by Keepnet Labs

Search Results - threat intel

5 Important Cyber Threat Intelligence Resources

This post will take you through Structured Threat Information Expression (STIX), Trusted Automated Exchange of Intelligence Information (TAXII), Oasis Open Command and Control (OpenC2), Traffic Light Protocol (TLP), and Cyberanalytics Repository by MITRE (CAR). With the knowledge of the aforementioned resources, you will be better equipped to identify threats and vulnerabilities.


CTI

Building a Cyber Threat Intelligence Platform in 5 steps

Cyber threat intelligence is information about a prevailing or evolving cyber threat that can be disseminated by threat intelligence partners to organizations in order to reinforce security against cyber-attack vectors , This short article will help you to leant how to build a Cyber Threat Intelligence Platform in 5 steps


Intelligent security is key to fight sophisticated threats

By : Adelle Geronim tahawultech.com/ Intelligent security is increasingly becoming vital as GCC CISOs continue to battle against increasingly sophisticated threats, according to experts. Erdal Ozkaya, Cybersecurity Architect at Microsoft, said, “An alarming number of regional organisations are still using outdated strategies and authentication models, even as international headlines continue to illustrate the intensity of the ongoing battles against bad actors.” Ozkaya [...]


A STRATEGIC PERSPECTIVE INTO THE TRADECRAFT OF THREAT ACTORS

Phishing and ransomware have been effective weapons for hackers. Even the most sophisticated cybersecurity measures have not been able to tackle these simple yet serious threats. In this upcoming GISEC.virtual interactive forum, powered by CyberKnight, we will be uncovering the trade secrets of cyber-attackers. A panel of technology advocates and end-user critics will be discussing the effectiveness of cyber threat [...]


Intelligent CIO Middle East Cover

I am really feeling privileged and excited to share with you that I made it second time to a magazine cover.  The Intelligent CIO Magazine,  September 2020 issue is featuring me and our interview about the latest cyber threats and my recommendations about cybersecurity . I will share the URL very soon😊 Thank you Lynch Pin Media   Erdal    


Artificial Intelligence: The Ultimate Weapon in the War against Cyber Criminals

For a legion of cybersecurity experts from across the globe, CISO MAG hosted a Fireside Chat with Dr. Erdal Ozkaya on the topic, “AI: The Ultimate Weapon in the War against Cyber Criminals.” Dr. Ozkaya is a an award-winning CISO of a regional bank. The Fire Chat was moderated by Brian Pereira, Principal Editor of CISO MAG, who interviewed Dr Erdal. It [...]


Train your Threat Hunting Skills

One of my best friends, my partner in conferences, books, family friend Milad Aslaner wrote a great PowerShell simulation which can help you train your Threat Hunting skills. The good news is its completley FREE , below are the details and download link : Introduction ThreatHunt is a simple PowerShell repository that allows you to train your threat hunting skills. [...]


Symantec 2019 Internet Security Threat Report.

Formjacking. Targeted Attacks. Living off the Land. Coming for Your Business. Symantec’s 2019 Internet Security Threat Report takes a deep dive into insights from the world’s largest civilian global intelligence network, revealing: Formjacking attacks skyrocketed, with an average of 4,800 websites compromised each month.Ransomware shifted targets from consumers to enterprises, where infections rose 12 percent.More than 70 million records stolen from [...]


CROWDSTRIKE GLOBAL THREAT REPORT 2019

Adversary Tradecraft and The Importance of Speed The 2019 CrowdStrike® Global Threat Report offers one of the industry’s most comprehensive reports on today’s top cyberthreats. It combines analysis from CrowdStrike Threat Intelligence, Falcon OverWatch™ managed hunting and the CrowdStrike Services incident response teamshighlighting the most significant events and trends in the past year. It combines CrowdStrike’s comprehensive global observations with real-world case studies to [...]


Knowing the threat actors behind a cyber attack

This article is an excerpt taken from our latest book Hands-On Cybersecurity for Finance written by  Milad Aslaner and myself. In this book you will learn how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security.     In this article, you will understand the different types of threat actor [...]