Our Blog

Check back for weekly updates

Threat Intelligence Through the Eyes of Adversaries

Any adversary conducts reconnaissance on a potential target with one question in mind: is the time and resources for research, development, and exploitation, going to be worth the gain? Below are four insights on threat intelligence from the eyes of adversaries....

read more

How to Use Context to Secure Your Platforms

Attribution often gets a bad name in the cybersecurity industry. Attribution can be challenging and may not lead to a direct business outcome is a common refrain. Companies that operate digital platforms have a unique advantage when it comes to attribution, however....

read more

Know Your Adversary™: Russian APTs

In the previous two articles in this series, we examined the Iranian and Nigerian Advanced Persistent Threats (APTs) under a sociohistorical lens in order to better understand the various drivers that instigate their threat activity. Today, we examine Russia under the...

read more

Four Priorities for Aligning Your Insider Threat Program

Organizations based in the United States continue to deal with considerable intellectual property theft and largely do not address the issue until there is a problem. The ability to effectively monitor for negligent or malicious insider threat activity is largely...

read more

Stay up to the minute

Subscribe to our blog to get notified of updates in your inbox.