Network Security
Danielle Correa, Roi Perez,
Mar 28, 2017
Carbon Black hosted a press briefing in London this morning to discuss research it has conducted to gauge how security researchers perceive non-malware attacks, and how good Artificial Intelligence (AI) and Machine Learning (ML) are at stopping them.
Opinion
Mar 28, 2017
Right now, digitalisation is transforming entire industries. Etienne Greef says as new technologies redefine how we work, play and live, organisations have extraordinary new opportunities for growth and innovation.

SC Buyer's Guide 2017

SC Events

Vendor Webcast

Threat Intelligence is Dead. Long Live Threat Intelligence!

12th April at 2:00pm BST || Join us as we discuss what true Threat Intelligence is, and secondly, how your organisation can effectively integrate Threat Intelligence...

x

Threat Intelligence is Dead. Long Live Threat Intelligence!

Threat Intelligence is a very hot topic at the moment and many organisations are looking to establish their own Threat Intelligence capabilities. Everybody wants their own reliable, comprehensive and actionable feed of Threat Intelligence that can inform and bolster their cyber-security controls, but with such a vast multitude of available indicators, how do you make sense of them all?


In this live webcast, Rafe Pilling, Senior Researcher with the SecureWorks Counter Threat Unit (CTU), cuts through the hype to explain firstly, what true Threat Intelligence is, and secondly, how your organisation can effectively integrate Threat Intelligence into your cyber defences.

More Info

Sponsored by: SecureWorks

Features

Tweets

PRODUCT REVIEWS

SC Magazine Best Buy

Anomali ThreatStream

Verdict: Solid threat intelligence product with a prodigious collection of resources. Fits well into just about threat and intelligence analysis tool set. At a price that is hard to beat, we make this our best Buy.

SurfWatch Threat Analyst

Verdict: In a sensitive environment – such as a financial institution that can afford the resource – this is a very solid contender. There is a whole lot to like about it and it may be one of the most powerful tools on the market.

CounterTack Digital DNA DDNA

Verdict: This is a good tool and certainly has a place in your analysis stack.

Cyjax Intelligence Platform

Verdict: We wish that Cyjax would use humans instead of computers to probe underground forums. Also, this is a bit pricey for what it offers. However, if you need open source intelligence with a bit of closed source thrown in, this is well worth your time to examine.

SC Magazine Recommended

CrowdStrike Falcon Intelligence

Verdict: If you need this level of analysis and if you can afford it, this is a solid choice for your cyber intel arsenal. We make it our Recommended choice.

Catbird Secure

Verdict: This has long been one of our favourite products and it is well worth considering.

CloudPassage Halo

Verdict: Good, well though-out tool and, if you are looking for out-of-the-box compliance capabilities, this one demands your attention.

SC Magazine Recommended

FireMon FortyCloud

Verdict: A powerful tool with a clear and important mission that it fulfills well. We make this our Recommended product this month.

Whitepapers

Osterman Research: GDPR Compliance and Its Impact on Security and ...

The EU’s GDPR is triggering a change in how organizations need to protect personal data. Learn why compliance requires unprecedented levels of effort and what specific security measures...

Forrester Brief: You Need an Action Plan for GDPR

The Forrester Research Brief “You Need an Action Plan for the GDPR” helps your security, regulatory and privacy teams grasp five must-have changes necessary to comply with the GDPR...

Research Shows Office 365 Surging But Risks Remain

A recent study found 85% of respondents viewing email as critical to the organization. Whether you're already executing or planning a migration, this report reveals insights that...

2016 Global Encryption Trends Study

The 2016 Global Encryption Trends Study provides in-depth information about the role of encryption as a part of an overall data protection strategy and how its use results in an improved...

GET SC MEDIA UK DELIVERED TO YOUR INBOX