Skip links

Search Results for: threat intel

Cyber Threat Intelligence Resources

Cyber Threat Intelligence Resources – Free and Useful Top 5

This post will take you through Structured Threat Information Expression (STIX), Trusted Automated Exchange of Intelligence Information (TAXII), Oasis Open Command and Control (OpenC2), Traffic Light Protocol (TLP), and Cyberanalytics Repository by MITRE (CAR). With the knowledge of the aforementioned resources, you will be better equipped to identify threats and vulnerabilities.

Practical Cyber Threat Intelligence

Practical Cyber Threat Intelligence – New Book (17th)

Practical Cyber Threat Intelligence This is my seventeenth book with my name on the cover and like its predecessors, this book represents several years of in-depth research, analysis, and real-life work experience. While working as a Chief Information Security Officer (CISO )in a world class cybersecurity firm (Comodo Cybersecurity), spending time with cybersecurity communities, authoring […]

Cyber Threat Intelligence

Cyber Threat Intelligence – Free Training Video

Cyber Threat Intelligence : HOW THREAT INTELLIGENCE IS USED TO REDUCE AN ORGANIZATION’S RISK PROFILE. Topic Abstract: Threat Intelligence plays a crucial part in the digital world. It reduces the risk of critical security breaches and helps organizations align their security budgets with their requirements. Threat Intelligence focuses primarily on prevention, allowing security leaders to […]

CTI

Building a Cyber Threat Intelligence Platform in 5 steps

Cyber threat intelligence is information about a prevailing or evolving cyber threat that can be disseminated by threat intelligence partners to organizations in order to
reinforce security against cyber-attack vectors , This short article will help you to leant how to build a Cyber Threat Intelligence Platform in 5 steps

Threat Hunting

Threat Hunting In The Shadows Protection – Free Webinar

Threat Hunting in the Shadows Protection First; Not Detection Preventing file-less attacks & unknown malware from wreaking havoc on your organization can be a daunting task; especially if you lack visibility to detect it. It’s critical to pro-actively hunt for this activity and ensure you’re collecting the right telemetry across your network & endpoints. Anti-virus […]

Free Event

Cyber Threats and Breach Protection – Free Webinars 2022

Cyber Threats and Breach Protection Cybersecurity Ventures expects global cybercrime to reach $10.5 by 2025 – up from $3 trillion in 2015. With this staggering growth putting businesses of all sizes at risk, it’s essential that organizations understand the latest threats and trends defining the 2022 threatscape. Join key industry professionals and leaders in this […]

Erdal Ozkaya in the News

Comodo target last 1% of cyber threats putting South Africa firms at risk

Pinnacle’s new cyber security division has partnered with Comodo Cybersecurity to offer managed service providers a solution that blocks unknown cyber threats putting organizations at risk in South Africa. Announcing the new opportunity for South African MSPs during a webinar held in partnership with ITWeb, Joseph Jaghab, Head of Partnerships at Comodo Cybersecurity, noted: “You […]

This website uses cookies to improve your web experience.
Explore
Drag