Complimentary Webinar: Get Help with Privileged Access Management (PAM)
You’re invited to join our complimentary webinar on privileged access management (PAM). Please click here to register.
Title: Harnessing Privileged Access Management (PAM) to Defend Core Digital Assets Against a Breach
When: October 16, 2015 at 2:00… Continue reading
Security Architecture Group Survey Results are In
The following survey of Linked In’s Security Architecture Group found members highly motivated to gain multidisciplinary learnings, and improve coverage of their broad interests through increased volunteer activity, better focused discussions and other group enhancements. Let these results … Continue reading
Is Threat Intelligence a Misnomer?
The bulk of what passes for “threat intelligence” is just ephemeral data, frequently changed by hackers, and only useful on short-lived blacklists. To improve their cybersecurity, organizations need to raise their “threat IQ”. The security ecosystem of vendors and… Continue reading
Speaking at the Threat Intelligence Summit 2015
MISTI’s Threat Intelligence Summit 2015 is coming to Orlando September 29-30, and I’ll be speaking there on:
___
Separating Threat Intelligence from FUD: An Enterprise Approach
A breach here, an NSA expose there – cybersecurity’s constantly in the news. Fear,… Continue reading