Standard language and processes, not to mention more efficient dissemination of findings and alerts all make documenting your security processes a must As cyber threat intelligence grows as a field, assisting everyone from SOC analysts to C-suite executives, threat intel teams can benefit from process documentation and best practices. These concepts help build much-needed common
The common thread: Each acts as a force multiplier, adding value to every other security technology around it. A few weeks ago, while attending Black Hat 2019, I was invited to participate in a Dark Reading technology panel hosted by editor Tim Wilson. The discussion focused on new types of technologies that can truly improve
There are severe and unsolved problems in our industry that justify a sustained effort and substantial investment. It’s worth picking one. There’s been a lot of talk lately of a cybersecurity moon shot. Unfortunately, the model seems to be the war on cancer, not the Apollo program. Both are worthwhile, but they are meaningfully different.