Learn how Recorded Future empowers ServiceNow customers to streamline workflows, identify and prioritize threats faster, and make more confident decisions. The post Why ServiceNow and Recorded Future Are Better Together appeared first on Recorded Future. Advertise on IT Security…
Category: Recorded Future
Security Wisdom From the FS-ISAC
DK Lee from FS-ISAC shares insights on threat intelligence, as well as opinions on leadership, organizational maturity, and checking your ego at the door. The post Security Wisdom From the FS-ISAC appeared first on Recorded Future. Advertise on IT…
5 Ransomware Trends to Watch in 2020
Allan Liska predicts that ransomware attacks will continue to grow as cybercriminals get more sophisticated in their methods and expand their reach. The post 5 Ransomware Trends to Watch in 2020 appeared first on Recorded Future. Advertise on IT…
The Definitive Guide to Reducing Risk: Launching at RSA Conference 2020
This sneak peek of “The Risk Business” explains how your organization can benefit from shifting to a risk-based approach to cybersecurity. The post The Definitive Guide to Reducing Risk: Launching at RSA Conference 2020 appeared first on Recorded Future. …
Automating Security With Recorded Future
Automating security allows our clients to improve team efficiencies, extend the value of existing security tools, and effectively combat threat actors. The post Automating Security With Recorded Future appeared first on Recorded Future. Advertise on IT Security News. Read…
Understanding Russia’s Global Online Influence
Oscar Jonsson, director of the Stockholm Free World Forum, discusses his recently published book about the history of Russian tactics and strategies. The post Understanding Russia’s Global Online Influence appeared first on Recorded Future. Advertise on IT Security News.…
How North Korea Revolutionized the Internet as a Tool for Rogue Regimes
Insikt Group analyzes the internet activity of the North Korean elite, providing a window into the digital lives of North Korea’s most senior leadership. The post How North Korea Revolutionized the Internet as a Tool for Rogue Regimes appeared first…
Why Monitoring Third-Party SSL Certificates Matters
With a third-party risk solution that monitors your third parties’ SSL and TLS certificates, you can protect against the consequences of certificate lapses. The post Why Monitoring Third-Party SSL Certificates Matters appeared first on Recorded Future. Advertise on IT…
Why Monitoring Third-Party SSL Certificates Matters
With a third-party risk solution that monitors your third parties’ SSL and TLS certificates, you can protect against the consequences of certificate lapses. The post Why Monitoring Third-Party SSL Certificates Matters appeared first on Recorded Future. Advertise on IT…
2019 Vulnerability Report: Cybercriminals Continue to Target Microsoft Products
Our researchers scoured thousands of sources to bring you the top 10 vulnerabilities being actively exploited by cybercriminals in 2019. The post 2019 Vulnerability Report: Cybercriminals Continue to Target Microsoft Products appeared first on Recorded Future. Advertise on IT…
A Journalist’s Perspective on Global Cyber Threats
Hakan Tanriverdi, cybersecurity journalist for Germany’s public broadcasting network, discusses what it’s like reporting on a highly technical subject area. The post A Journalist’s Perspective on Global Cyber Threats appeared first on Recorded Future. Advertise on IT Security News.…
Protecting the Hospitality Sector With Security Intelligence
In the wake of recent breaches, many hospitality companies have started using security intelligence to help identify and respond to serious cyber threats. The post Protecting the Hospitality Sector With Security Intelligence appeared first on Recorded Future. Advertise on…
Protecting the Hospitality Sector With Security Intelligence
In the wake of recent breaches, many hospitality companies have started using security intelligence to help identify and respond to serious cyber threats. The post Protecting the Hospitality Sector With Security Intelligence appeared first on Recorded Future. Advertise on…
More Than Just SOAR: How to Automate Security With Intelligence
Learn the several ways your organization can automate security with intelligence to better defend against and respond to emerging cyberattacks. The post More Than Just SOAR: How to Automate Security With Intelligence appeared first on Recorded Future. Advertise on…
Teachers, Trainers, and Educators
Evan Paul Jensen, CTO and co-founder of Boston Cybernetics, discusses his organization’s unique approach to training and operational security issues. The post Teachers, Trainers, and Educators appeared first on Recorded Future. Advertise on IT Security News. Read the complete…
European Energy Sector Organization Targeted by PupyRAT Malware in Late 2019
Insikt Group identified a PupyRAT C2 server communicating with a mail server for a European energy sector organization starting late last year. The post European Energy Sector Organization Targeted by PupyRAT Malware in Late 2019 appeared first on Recorded Future.…
Endpoint Security in Action: How Security Intelligence Provides Protection for Endpoints
Learn how security intelligence can protect a company’s brand and digital infrastructure and protect the infrastructures of customers from cyberattacks. The post Endpoint Security in Action: How Security Intelligence Provides Protection for Endpoints appeared first on Recorded Future. Advertise…
How to Empower Your SOC With Security Intelligence
This excerpt from our new book explains how rich, contextualized threat intelligence helps SOC analysts work more efficiently and make informed decisions. The post How to Empower Your SOC With Security Intelligence appeared first on Recorded Future. Advertise on…
The Physical and the Digital of Open Source Intelligence
Nico Dekens, also known as the “Dutch OSINT Guy,” discusses gathering OSINT and explains how individuals can do a better job protecting themselves online. The post The Physical and the Digital of Open Source Intelligence appeared first on Recorded Future.…
How Security Intelligence Enhances Cloud Security
Find out how security intelligence helps cloud security teams strengthen the policies and controls that govern and protect their cloud environments. The post How Security Intelligence Enhances Cloud Security appeared first on Recorded Future. Advertise on IT Security News.…
What the 6 Phases of the Threat Intelligence Lifecycle Mean for Your Team
This excerpt from our new book focuses on how understanding the threat intelligence lifecycle phases can improve your current cybersecurity strategy. The post What the 6 Phases of the Threat Intelligence Lifecycle Mean for Your Team appeared first on Recorded…
Master Your Patch Management With Vulnerability Response: Our Latest ServiceNow Integration
Our ServiceNow Vulnerability Response integration streamlines the validation of vulnerabilities, simplifies prioritization for patch management, and more. The post Master Your Patch Management With Vulnerability Response: Our Latest ServiceNow Integration appeared first on Recorded Future. Advertise on IT Security…
Threat Intelligence Is the Centerfold
Steven Atnip, senior advisor for Verizon’s threat research advisory center and dark web hunting team, joins us to share his insights on security and more. The post Threat Intelligence Is the Centerfold appeared first on Recorded Future. Advertise on…
Building a Business Case for Security Intelligence: How Much Our Clients Save With Recorded Future
Find out how Recorded Future helped a major global clothing retailer save hundreds of thousands of dollars by automating security intelligence reporting. The post Building a Business Case for Security Intelligence: How Much Our Clients Save With Recorded Future appeared…
Building a Business Case for Security Intelligence: How Much Our Clients Save With Recorded Future
Find out how Recorded Future helped a major global clothing retailer save hundreds of thousands of dollars by automating security intelligence reporting. The post Building a Business Case for Security Intelligence: How Much Our Clients Save With Recorded Future appeared…
Profiling the Linken Sphere Anti-Detection Browser
Insikt Group analyzes the Linken Sphere anti-detection browser and explains how the tool is used by cybercriminals to bypass fraud detection systems. The post Profiling the Linken Sphere Anti-Detection Browser appeared first on Recorded Future. Advertise on IT Security…
Iranian Cyber Response to Death of IRGC Head Would Likely Use Reported TTPs and Previous Access
We assess the likelihood of Iran’s response to the killing of Qassem Suleimani and discuss likely tactics and groups involved in a cyber-based retaliation. The post Iranian Cyber Response to Death of IRGC Head Would Likely Use Reported TTPs and…
Protecting the Financial Sector Never Goes out of Style
Daniel Cuthbert, global head of cybersecurity research at Banco Santander, discusses his work in the finance industry, his path to cybersecurity, and more. The post Protecting the Financial Sector Never Goes out of Style appeared first on Recorded Future. …
Nation-States, Ransomware Attacks, and Dark Web Activity: Our Top 5 Research Pieces From 2019
We remember some of the most important research projects conducted by Insikt Group in 2019 and give you an overview of their findings. The post Nation-States, Ransomware Attacks, and Dark Web Activity: Our Top 5 Research Pieces From 2019 appeared…