Protecting against cyber-attacks is proving to be a real challenge. A few years ago, defence in depth was the recommended methodology to successfully fight cyber-attacks. Despite the proliferation of defence in depth mechanisms, a large number of high profile cyber-attacks are still observed. It's no surprise to anyone that all sensible business owners and world leaders are seriously worried about the impact of successful cyber-attacks against their environment. According to a survey by Forrester’s Foresights Security Survey in 2013, 75% of 490 companies agreed that cyber threat intelligence was a priority. The recent report “2015 Global Megatrends in Cybersecurity” sponsored by Raytheon suggest that most companies will deploy cyber threat intelligence over the next three years as a measure against cyber-attacks.
Jules Pagna Disso and Tom Wilson
Recent Posts
Eight Things To Consider Before Deploying Cyber Threat Intelligence
Posted by
Jules Pagna Disso and Tom Wilson on Jun 6, 2015
0 Comments Click here to read/write comments
Topics: Security Blog, Uncategorized
During the recent BSIDES conference (2014), which was hosted in Las Vegas, Kyle Adams presented on "Evading code emulation: Writing ridiculously obvious malware that bypasses AV":
0 Comments Click here to read/write comments
Topics: Security Blog, Uncategorized