What is a threat intelligence feed?
A threat intelligence feed is a data stream about potential attacks (known as “threat intelligence”) from an external source. Organizations can use threat intelligence feeds to keep their security defenses…
Your Go-To Source for Cyber Security Insights and Solutions
A threat intelligence feed is a data stream about potential attacks (known as “threat intelligence”) from an external source. Organizations can use threat intelligence feeds to keep their security defenses…
STIX/TAXII is a joint global initiative to drive threat intelligence sharing and collaboration among organizations. STIX/TAXII is a global initiative designed to mitigate and prevention of cyber threats. Launched in…
Threat intelligence is information about potential attacks. It helps organizations take action to defend themselves against these attacks. Threat intelligence is information about the potential attacks an organization may face…
Indicators of compromise (IoC) are evidence left behind by an attacker or malicious software that can be used to identify a security incident. Indicators of compromise (IoCs) are information about…
Attack vectors are how attackers can breach sensitive data or compromise an organization. What is an attack vector? An attack vector, or threat vector, is a way for attackers to…
Ryuk is a type of ransomware that attackers have used to extort money from businesses since 2018. The parties who operate Ryuk pursue bigger targets and charge heftier ransoms than…
Heuristics came to public attention when Daniel Kahneman published his best-selling book “Thinking, Fast and Slow”. In it, Kahneman summarized the findings from his decades-long collaboration with his research partner…
Personally Identifiable Information (PII) is the term used for data that can be traced back to one specific user. Examples of PII are names, social security numbers, biometrics, and other…
A zero-day exploit is an attack that takes advantage of a mostly unknown security vulnerability. What is a zero-day exploit? A zero-day exploit (also called a zero-day threat) is an…
Load balancing distributes traffic among multiple servers to improve a service or application’s performance and reliability. Load balancing is distributing computational workloads between two or more computers. Load balancing is…