Category: Recorded Future

White House Experience Informs Venture Capital

Read the original article: White House Experience Informs Venture Capital Nick Sinai, senior advisor at Insight Partners, discusses his past experience in the White House as the U.S. Deputy Chief Technology Officer. The post White House Experience Informs Venture Capital…

Security Intelligence Handbook Chapter 7: Understand Your Adversaries

Read the original article: Security Intelligence Handbook Chapter 7: Understand Your Adversaries Risk modeling offers a way to objectively assess current risks and estimate quantifiable financial returns from investments in cybersecurity. The post Security Intelligence Handbook Chapter 7: Understand Your…

Correlating the COVID-19 Opportunist Money Trail

Read the original article: Correlating the COVID-19 Opportunist Money Trail Insikt Group’s Lindsay Kaye and Charity Wright join the podcast to discuss their findings regarding the COVID-19 opportunist money trail. The post Correlating the COVID-19 Opportunist Money Trail appeared first…

You Need More Than Brand Monitoring To Protect Your Brand

Read the original article: You Need More Than Brand Monitoring To Protect Your Brand By surfacing relevant and actionable intelligence, brand intelligence enables you to defend your organization from common brand attacks. The post You Need More Than Brand Monitoring…

Unemployment Fraud in the Criminal Underground

Read the original article: Unemployment Fraud in the Criminal Underground Cybercriminals have demonstrated a preference to advertise unemployment fraud tutorials via messaging platforms over criminal forums. The post Unemployment Fraud in the Criminal Underground appeared first on Recorded Future.  …

SolarWinds: The CSO Perspective

Read the original article: SolarWinds: The CSO Perspective Gavin Reid, chief security officer at Recorded Future, shares his thoughts on the evolving SolarWinds breach and actions he’s taken as CSO. The post SolarWinds: The CSO Perspective appeared first on Recorded…

Adversary Infrastructure Report 2020: A Defender’s View

Read the original article: Adversary Infrastructure Report 2020: A Defender’s View Insikt Group tracks the creation of new infrastructure for post-exploitation toolkits, custom malware frameworks, and remote access trojans. The post Adversary Infrastructure Report 2020: A Defender’s View appeared first…

AI Enables Predictability and Better Business

Read the original article: AI Enables Predictability and Better Business Vice president of product for IBM Security Aarti Borkar joins the podcast this week to discuss her views on artificial intelligence. The post AI Enables Predictability and Better Business appeared…

SolarWinds Attribution: Are We Getting Ahead of Ourselves?

Read the original article: SolarWinds Attribution: Are We Getting Ahead of Ourselves? SolarWinds breach attribution — are we getting ahead of ourselves by assuming it’s Russia? John Wetzel takes a contrarian view in this blog. The post SolarWinds Attribution: Are…

AI Enables Predictability and Better Business

Read the original article: AI Enables Predictability and Better Business Vice president of product for IBM Security Aarti Borkar joins the podcast this week to discuss her views on artificial intelligence. The post AI Enables Predictability and Better Business appeared…

SolarWinds: What the Intelligence Tells Us

Read the original article: SolarWinds: What the Intelligence Tells Us Recorded Future’s David SooHoo provides a brief recap of the first five days following disclosure of the SolarWinds attack incident. The post SolarWinds: What the Intelligence Tells Us appeared first…

Threat Hunting Offsets the Technology Gaps

Read the original article: Threat Hunting Offsets the Technology Gaps EVP and head of Security Operations at Nuspire John Ayers discusses how organizations can best approach implementing threat hunting. The post Threat Hunting Offsets the Technology Gaps appeared first on…

What Geopolitical Intelligence Means

Read the original article: What Geopolitical Intelligence Means Geopolitical intelligence efficiently captures data and “chatter” from a variety of sources and filters it to deliver precision intelligence. The post What Geopolitical Intelligence Means appeared first on Recorded Future.   Become…

How to Apply Elite Intelligence to Microsoft Azure Sentinel

Read the original article: How to Apply Elite Intelligence to Microsoft Azure Sentinel See how our integrations with Microsoft Azure empower organizations to reduce risk and scale their cloud innovations securely. The post How to Apply Elite Intelligence to Microsoft…

Visionaries, Builders, and Operators

Read the original article: Visionaries, Builders, and Operators Jeff Fagnan, founder and managing director at Accomplice, shares why cybersecurity should be a foundational element of every modern company. The post Visionaries, Builders, and Operators appeared first on Recorded Future.  …

What Is Third-Party Intelligence?

Read the original article: What Is Third-Party Intelligence? Third-party intelligence is precision security intelligence that reduces risk by providing insights about the vendors and partner companies. The post What Is Third-Party Intelligence? appeared first on Recorded Future.   Become a…

An Ability to Execute and a Fantastic Amount of Luck

Read the original article: An Ability to Execute and a Fantastic Amount of Luck Andy Ellis, chief security officer of Akamai Technologies, discusses the importance of a company culture and his take on threat intelligence. The post An Ability to…

Build Better Phishing Playbooks with ServiceNow and Recorded Future

Read the original article: Build Better Phishing Playbooks with ServiceNow and Recorded Future At our Predict 2020 conference, ServiceNow’s Mike Plavin showcased the comprehensive Recorded Future ServiceNow integration portfolio. The post Build Better Phishing Playbooks with ServiceNow and Recorded Future…

What Vulnerability Intelligence Means for Your Organization

Read the original article: What Vulnerability Intelligence Means for Your Organization Vulnerability intelligence empowers you to defend your organization by prioritizing vulnerabilities that represent real risk to the business. The post What Vulnerability Intelligence Means for Your Organization appeared first…

Countering 5G Conspiracy Theories

Read the original article: Countering 5G Conspiracy Theories Dave Brown, cyber intelligence professional at BT, shares his insight on the physical availability of 5G for consumers and the public sector. The post Countering 5G Conspiracy Theories appeared first on Recorded…

Cyber is as Much Psychology as it is Technology

Read the original article: Cyber is as Much Psychology as it is Technology Pierre Noel, managing director at ISTARI, joins the podcast to share how culture impacts security and the importance of threat intelligence. The post Cyber is as Much…

How to Apply Elite Intelligence to AWS Security Services

Read the original article: How to Apply Elite Intelligence to AWS Security Services At Predict 2020, Amazon Web Services’ Trish Cagliostro demonstrated how to apply security intelligence to AWS security services. The post How to Apply Elite Intelligence to AWS…

Inside the World of Cyber Venture Capital

Read the original article: Inside the World of Cyber Venture Capital Listen to Mark Goodman, managing director at MassMutual Ventures, discuss if he thinks cyber continues to be a hot area for investment. The post Inside the World of Cyber…

The Third-Party Ransomware Attack You Never Saw Coming

Read the original article: The Third-Party Ransomware Attack You Never Saw Coming Our third-party intelligence allows you to monitor ransomware extortion sites for mentions of your vendors, suppliers, and partners. The post The Third-Party Ransomware Attack You Never Saw Coming…

How to Triage Splunk Alerts Faster

Read the original article: How to Triage Splunk Alerts Faster Recorded Future’s elite intelligence in Splunk enables security teams to move quickly and spend their time on the incidents that matter most. The post How to Triage Splunk Alerts Faster…

New APT32 Malware Campaign Targets Cambodian Government

Read the original article: New APT32 Malware Campaign Targets Cambodian Government Recorded Future’s Insikt Group has discovered a new malware campaign targeting the Cambodian government using an ASEAN-themed spearphish. The post New APT32 Malware Campaign Targets Cambodian Government appeared first…

Trickbot is Down But Not Out

Read the original article: Trickbot is Down But Not Out Recorded Future’s senior intelligence analyst Greg Lesnewich joins the podcast this week discuss the latest on the Trickbot global botnet. The post Trickbot is Down But Not Out appeared first…

Q3 2020 Vulnerability Landscape

Read the original article: Q3 2020 Vulnerability Landscape Based on analysis of vulnerabilities disclosed in Q3 of 2020, Insikt Group identified 22 as the most high-risk vulnerabilities of the quarter. The post Q3 2020 Vulnerability Landscape appeared first on Recorded…

Give Analysts Exactly What They Want

Read the original article: Give Analysts Exactly What They Want Paul Battista, CEO of Polarity, comes on the podcast to share how being stuck inside during a blizzard led to his creating a popular app. The post Give Analysts Exactly…

Too Sleepy to be Secure?

Read the original article: Too Sleepy to be Secure? Lincoln Keffengerger, threat intelligence lead at Deloitte Global shares his research into the role sleep has in keeping organizations safe. The post Too Sleepy to be Secure? appeared first on Recorded…

What Threat Intelligence Really Means

Read the original article: What Threat Intelligence Really Means Threat intelligence from Recorded Future is enriched by world-class analysts and can be integrated directly into your current workflows. The post What Threat Intelligence Really Means appeared first on Recorded Future.…

The TIP Is Dead, Long Live the TIP

Read the original article: The TIP Is Dead, Long Live the TIP TIPs provide insightful metrics and save an organization money by optimizing intelligence, content development, and investigation operations. The post The TIP Is Dead, Long Live the TIP appeared…

The FBI Builds Enduring Partnerships in Cyber

Read the original article: The FBI Builds Enduring Partnerships in Cyber FBI cyber division section chief Herb Stapleton discusses his journey toward a mission-based career in public service on the podcast. The post The FBI Builds Enduring Partnerships in Cyber…

Get Your Handbook for Disrupting Adversaries and Reducing Risk

Read the original article: Get Your Handbook for Disrupting Adversaries and Reducing Risk Our refreshed security intelligence handbook offers practical information and advice on disrupting the adversaries your organization faces. The post Get Your Handbook for Disrupting Adversaries and Reducing…

The Fascinating Paradox of Cryptocurrency

Read the original article: The Fascinating Paradox of Cryptocurrency Joining the podcast is Kim Grauer, head of research at Chainalysis, to express her views on cryptocurrency and the impact on monetary policy. The post The Fascinating Paradox of Cryptocurrency appeared…

How Predict 2020 Disrupted the Status Quo

Read the original article: How Predict 2020 Disrupted the Status Quo Access all of the on-demand video sessions from our Predict 2020 conference on the Recorded Future Predict 2020 video channel now! The post How Predict 2020 Disrupted the Status…

What Is SecOps Intelligence?

Read the original article: What Is SecOps Intelligence? SecOps intelligence enables you to discover previously unidentified threats and triage internal alerts in your existing SIEM and SOAR systems. The post What Is SecOps Intelligence? appeared first on Recorded Future.  …

What Brand Intelligence Means for Your Organization

Read the original article: What Brand Intelligence Means for Your Organization Brand intelligence is precision security intelligence that makes it easy to take down typosquat domains and find leaked credentials and more. The post What Brand Intelligence Means for Your…

Examining Russian Threats to the 2020 Election

Read the original article: Examining Russian Threats to the 2020 Election Roman Sannikov, director of cybercrime and underground intelligence at Recorded Future discusses the Russian threats to the 2020 US Election. The post Examining Russian Threats to the 2020 Election…

What to Expect at Predict 2020

Read the original article: What to Expect at Predict 2020 Join us at Predict to find out how security intelligence is being used to defend organizations and infrastructures against threat actors. The post What to Expect at Predict 2020 appeared…

How Security Intelligence Protects Sensitive Retail Data

Read the original article: How Security Intelligence Protects Sensitive Retail Data Applying security intelligence is key as retailers leverage digital transformation to communicate with customers and respond to their needs. The post How Security Intelligence Protects Sensitive Retail Data appeared…

Delivering Maximum Impact in the Public Sector

Read the original article: Delivering Maximum Impact in the Public Sector Michael Anderson, chief information security officer for Dallas County, discusses his career, including 10 years in the Intelligence Corp. The post Delivering Maximum Impact in the Public Sector appeared…

Defend Your Physical Assets With Geopolitical Intelligence

Read the original article: Defend Your Physical Assets With Geopolitical Intelligence Our Geopolitical Intelligence Module accelerates critical decision-making with contextual OSINT data on geopolitical threats and trends. The post Defend Your Physical Assets With Geopolitical Intelligence appeared first on Recorded…

4 Things Nobody Tells You About Security Intelligence

Read the original article: 4 Things Nobody Tells You About Security Intelligence To help shed some light, leaders from Recorded Future identified some of the things people don’t realize about security intelligence. The post 4 Things Nobody Tells You About…

Proactively Reduce Risk With Third-Party Intelligence

Read the original article: Proactively Reduce Risk With Third-Party Intelligence Our third-party intelligence gives continuous visibility on your entire supply chain by automatically alerting you to new cyber risk events. The post Proactively Reduce Risk With Third-Party Intelligence appeared first…

Curating Your Personal Security Intelligence Feed

Read the original article: Curating Your Personal Security Intelligence Feed Sal Aurigema, associate professor at the University of Tulsa, discusses the importance of curating a personal security intelligence feed. The post Curating Your Personal Security Intelligence Feed appeared first on…

5 Questions to Ask Yourself About Your Third-Party Risk

Read the original article: 5 Questions to Ask Yourself About Your Third-Party Risk Positioning security intelligence at the core of a third-party risk strategy enables you to track dynamic changes to vendors’ risk profiles. The post 5 Questions to Ask…

Elite Threat Intelligence That Disrupts Adversaries

Read the original article: Elite Threat Intelligence That Disrupts Adversaries Recorded Future eliminates manual research and surfaces intelligence in real time, providing a comprehensive view of their threat landscape. The post Elite Threat Intelligence That Disrupts Adversaries appeared first on…

Back Despite Disruption: RedDelta Resumes Operations

Read the original article: Back Despite Disruption: RedDelta Resumes Operations Insikt Group provides updates on tracking the activity of the suspected Chinese state-sponsored threat activity group RedDelta. The post Back Despite Disruption: RedDelta Resumes Operations appeared first on Recorded Future.…

Passion, Curiosity, and a Dash of Mischief

Read the original article: Passion, Curiosity, and a Dash of Mischief Kevin Magee, chief security officer at Microsoft Canada, shares his story of entrepreneurship, curiosity, and a lifelong passion for learning. The post Passion, Curiosity, and a Dash of Mischief…

Optimize Your Security Tech Stack With SecOps Intelligence

Read the original article: Optimize Your Security Tech Stack With SecOps Intelligence Our SecOps Intelligence Module enables security operations and incident response analysts to identify unknown threats and respond confidently. The post Optimize Your Security Tech Stack With SecOps Intelligence…

Why Brand Intelligence Is Critical to Your Reputation

Read the original article: Why Brand Intelligence Is Critical to Your Reputation By collecting intelligence across open, closed, and technical sources, our brand intelligence module delivers context to defend your brand. The post Why Brand Intelligence Is Critical to Your…

The Highest Security Intelligence in the Shortest Time

Read the original article: The Highest Security Intelligence in the Shortest Time Craig Adams, chief product officer at Recorded Future, discusses how organizations should optimize investments through security intelligence. The post The Highest Security Intelligence in the Shortest Time appeared…

Elite Intelligence for Driving Business Outcomes

Read the original article: Elite Intelligence for Driving Business Outcomes The business value of security intelligence is demonstrated in its ability to align data with operational outputs that are relevant to an organization. The post Elite Intelligence for Driving Business…

Russian-Related Threats to the 2020 US Presidential Election

Read the original article: Russian-Related Threats to the 2020 US Presidential Election Insikt Group provides an overview of Russia-nexus cyberespionage and influence operations activity related to the 2020 U.S. elections. The post Russian-Related Threats to the 2020 US Presidential Election…

Creating Your Team of Security Intelligence Champions

Read the original article: Creating Your Team of Security Intelligence Champions When people and machines are paired, each works smarter, saving time and money, reducing human burnout, and improving security overall. The post Creating Your Team of Security Intelligence Champions…

Elite Security Intelligence That Moves at the Speed of Business

Read the original article: Elite Security Intelligence That Moves at the Speed of Business Recorded Future just introduced our six modules, each tailored to specific use cases to provide actionable security intelligence to streamline workflows. The post Elite Security Intelligence…

The Diversity of Security Challenges in Higher Education

Read the original article: The Diversity of Security Challenges in Higher Education Bob Turner, chief information security officer at the University of Wisconsin, Madison, discusses some of the challenges he faces in his profession. The post The Diversity of Security…

Behind the Scenes of a Brand Protection Takedown

Read the original article: Behind the Scenes of a Brand Protection Takedown Recorded Future’s chief marketing officer Tom Wentworth explores just how important the impact of security intelligence is on a company’s brand. The post Behind the Scenes of a…

Launching the Cyber Intelligence News Site The Record

Read the original article: Launching the Cyber Intelligence News Site The Record Adam Janofsky discusses the launch of The Record by Recorded Future, which will aim to fill the gap between fast-breaking headlines and long-lead research. The post Launching the…

The Transformation of Managed Security Services

Read the original article: The Transformation of Managed Security Services Jim Aull, solutions architect at Verizon, shares insight into common misperceptions he finds companies may have when starting out on their security journey. The post The Transformation of Managed Security…

Insider Secrets From a Front-Line Industrial CISO

Read the original article: Insider Secrets From a Front-Line Industrial CISO While OT and IT leaders across the business are collaboratively addressing evolving challenges and threats, CISOs are uniquely positioned to lead. The post Insider Secrets From a Front-Line Industrial…

Defending MacOS Against Sophisticated Attacks

Read the original article: Defending MacOS Against Sophisticated Attacks Phil Stokes, security researcher at SentinelOne, joins the podcast to share his insights on the state of security on Apple’s desktop operating system. The post Defending MacOS Against Sophisticated Attacks appeared…