Threat Intelligence Articles
Threat intelligence is a critical component of any cybersecurity program. It provides organizations with information about potential threats, such as the identity of threat actors, their motivations, and their capabilities. This information can be used to improve security posture, detect and respond to attacks more quickly, and make better decisions about risk. This blog category will discuss the benefits of collecting and analyzing data via threat intelligence best practices.
Cyber Threat Hunting
Increasingly, organizations of all sizes are starting to augment their cyber defenses through Threat Hunting. In this post we will explore what Cyber Threat Hunting is and how it can help you to improve your cyber defenses.
April 18, 2024 | Cyber Threats, Threat Intelligence
How Generative AI is Poised to Transform Cybersecurity
This article discusses the ways generative AI is radically changing cybersecurity and how an extended detection and response platform protects an IT environment from cyberattacks developed with these powerful tools.
April 5, 2024 | Threat Intelligence
How UBA and UEBA Impact Cybersecurity and Threat Detection
We are going to look at how behavior analytics can be used to help identify threats to the environment that escape detection from traditional cybersecurity measures. Effective use of behavior analytics can improve an organization’s security posture and better protect it from threat actors.
June 5, 2023 | Threat Intelligence, Cyber Threats
NTT Security Holdings 2023 Global Threat Intelligence Report
The recently released 2023 Global Threat Intelligence Report by NTT Security Holdings highlights the growing convergence of cyberthreats and their physical implications. This timely report sheds light on the most prevalent attacks of the past year.
May 30, 2023 | Threat Intelligence, Announcements
How does XDR help defend against polymorphic malware?
Polymorphic malware is malicious software with the ability to change its identifiable characteristics as it traverses an IT environment or system. Typically this involves techniques such as changing encryption keys or file names to modify its signature.
March 30, 2023 | XDR, Cyber Threats, Threat Intelligence
Password Managers that have been hacked
New technologies are developing at a seemingly never-ending rate and users are reaping the rewards of greater connectivity, lower friction in online interactions, and even AI writing capabilities. Nowadays, the average person is likely to be heavily reliant on online services for everything from personal finances to entertainment, fitness and wellbeing, to gas bills.
March 27, 2023 | Threat Intelligence
ChatGPT & Cybersecurity: Does it pose a risk?
The market is currently glistening with shiny new tech that holds much promise and seeks to revolutionize the world even further. This is illustrated by monetary developments like cryptocurrency and how the shift from physical money has morphed into a new digital format.
March 27, 2023 | Threat Intelligence
Internet Security: How to prepare for when the world runs on AI
The coming years will see Internet security informed by an AI and ML-powered arms race between defenders and attackers. Organizations that fail to implement cutting-edge AI solutions will find themselves at a distinct disadvantage.
February 24, 2023 | Threat Intelligence
Samurai Threat Intelligence - what is it and how our customers get value
Threat intelligence is a critical component of any cybersecurity approach, it assists in identifying and tackling existing and new waves of cyber threats. But not all threat intelligence is created equal.
September 19, 2022 | Threat Intelligence
Download the
Global Threat
Intelligence Report
Download NowFeatured articles
Cyber Threat Hunting
18 April 2024 | Cyber Threats
Increasingly, organizations of all sizes are starting to augment their cyber defenses through Threat Hunting. In this post we...
How Generative AI is Poised to Transform Cybersecurity
5 April 2024 | Threat Intelligence
This article discusses the ways generative AI is radically changing cybersecurity and how an extended detection and response platform protects...
How UBA and UEBA Impact Cybersecurity and Threat Detection
5 June 2023 | Threat Intelligence
We are going to look at how behavior analytics can be used to help identify threats to the environment that...