Skip to main content

May 04, 2016

The First Two Steps – Operationalizing Enterprise Threat Intelligence, Really

Threat intelligence, about three years after it became the talk of RSA Conference, is still a hot topic for the enterprise. Rightfully so, as it’s a p...

See Details

April 13, 2015

Digital Sleight of Hand

It’s a good sign that attackers find themselves having to become more sophisticated and creative to beat corporate defenses. That being said, there is...

See Details

March 19, 2015

Balancing Information Security and Usability | Optiv

One of the most difficult things security leaders do every day is balancing the scales between keeping their organization’s critical assets safe and e...

See Details

February 19, 2015

The Operational Case for an Intelligence-Driven Security Program (Part 2 of 2)

From an operations perspective, there are a few key points where enterprise security can benefit from threat intelligence as a platform. In my previou...

See Details

February 18, 2015

The Operational Case for an Intelligence-Driven Security Program (Part 1 of 2)

In my last post, I discussed the business case for threat intelligence, and why I believe threat intelligence should be a pivotal part of any modern e...

See Details

January 23, 2015

An Intelligence-Driven Security Program | Optiv

Threat intelligence is a term that causes some people to roll their eyes – mainly because they’ve been relentlessly bombarded with the typical hype an...

See Details