Most Recent Blogs

Are There Qualitative Differences Between Threat Intelligence Feeds?

Posted: July 17, 2015   /   By: Jon Oltsik   /   Tags: Cybersecurity, Threat Intelligence Lifecycle

horizonWhile cyber threat intelligence hype is at an all-time high across the industry, many enterprise organizations are actually building internal programs and processes for threat intelligence consumption, analysis, and operationalization. 

Read More

Threat Intelligence Sharing Momentum and Needs

Posted: April 13, 2015   /   By: Jon Oltsik   /   Tags: Cybersecurity, Threat Intelligence Lifecycle, cybersecurity legislation

sharing_in_businessThreat intelligence sharing is certainly riding a wave of momentum as we head into the RSA Conference next week. Over the past 6 months, we’ve seen things like lots of federal activity, further adoption of threat intelligence standards, and industry actions.

Read More

Will Public/Private Threat Intelligence Sharing Work?

Posted: March 12, 2015   /   By: Jon Oltsik   /   Tags: Cybersecurity, Threat Intelligence Lifecycle, nsa

In January, Representative Charles Albert “Dutch” Ruppersberger (D-MD) reintroduced the Cyber Intelligence Sharing and Protection Act (CISPA) as H.R. 234 into the 114th Congress.  The bill was first introduced by Mike Rogers (R-MI) in 2011.

Read More

Threat Intelligence Lifecycle Maturation in the Enterprise Market

Posted: July 15, 2014   /   By: Jon Oltsik   /   Tags: Data Management & Analytics, Information and Risk Management, Security and Privacy, Threat Intelligence Lifecycle

According to ESG research from 2012, 65% of enterprise organizations (i.e., more than 1,000 employees) used external threat intelligence as part of their information security analytics activities (note: I am an ESG employee). The two most popular threat intelligence types were related to vulnerabilities and malware (each is consumed by 63% of organizations that use external threat intelligence).

Read More

Posts by Topic

see all