The Differences Between Indicators of Attack vs. Indicators of Compromise

Proactivity is the name of the game when it comes to cyber security in our modern age.  Threats work carefully to exploit unknown security holes, and attack organizations when they least expect it.  The prevention [...]

New Threat Hunting Platforms Emerging to Combat Advanced Security Threats

Cyber attacks continue to be extremely large threats to organizations and infrastructure within our contemporary society.  Being that technology has become much more heavily relied on than ever, cyber criminals are becoming more ruthless and [...]

Retail Cyber Security: The Challenges of Fighting Fraud Following a Hack

Cyber attackers can have an extremely vast array of organizations that they target.  Though, there are some that tend to be more prominent targets.  One of such is retail locations, and one need not look [...]

Open vs. Closed Source: What is the Future of Cyber Intelligence

Cyber intelligence is a topic which has come much more prominently into the scene of cyber security.  While previously thought of as a commodity, the addition of cyber intelligence is in reality a necessity in [...]

Dark Social Growing Challenge for Cyber Intelligence

There are many coined phrases when it comes to the world of cyberspace.  One of such, that many have not heard of is “dark social.”  Dark social is defined essentially as untraceable social traffic, such [...]

Is U.S. Properly Prepared for a 2017 Cyber Attack

Cyber attacks have unfortunately become a commonality within our country.  Numerous amounts of these types of attacks are targeted toward the United States every single day.  From cyber criminals to nation-state attacks, cyber attacks are [...]