What is STIX/TAXII?
STIX/TAXII is a joint global initiative to drive threat intelligence sharing and collaboration among organizations. STIX/TAXII is a global initiative designed to mitigate and prevention of cyber threats. Launched in…
Your Go-To Source for Cyber Security Insights and Solutions
STIX/TAXII is a joint global initiative to drive threat intelligence sharing and collaboration among organizations. STIX/TAXII is a global initiative designed to mitigate and prevention of cyber threats. Launched in…
Threat intelligence is information about potential attacks. It helps organizations take action to defend themselves against these attacks. Threat intelligence is information about the potential attacks an organization may face…
Indicators of compromise (IoC) are evidence left behind by an attacker or malicious software that can be used to identify a security incident. Indicators of compromise (IoCs) are information about…
Attack vectors are how attackers can breach sensitive data or compromise an organization. What is an attack vector? An attack vector, or threat vector, is a way for attackers to…
Ryuk is a type of ransomware that attackers have used to extort money from businesses since 2018. The parties who operate Ryuk pursue bigger targets and charge heftier ransoms than…
Heuristics came to public attention when Daniel Kahneman published his best-selling book “Thinking, Fast and Slow”. In it, Kahneman summarized the findings from his decades-long collaboration with his research partner…
Personally Identifiable Information (PII) is the term used for data that can be traced back to one specific user. Examples of PII are names, social security numbers, biometrics, and other…
A zero-day exploit is an attack that takes advantage of a mostly unknown security vulnerability. What is a zero-day exploit? A zero-day exploit (also called a zero-day threat) is an…
A next-generation firewall (NGFW) is a security appliance that processes network traffic and applies rules to block potentially dangerous traffic. NGFWs evolve and expand upon the capabilities of traditional firewalls.…
Load balancing distributes traffic among multiple servers to improve a service or application’s performance and reliability. Load balancing is distributing computational workloads between two or more computers. Load balancing is…