Premium Content

Access "Threat intelligence and risk: Why cybersecurity hangs in the balance"

Issue Overview

Information Security magazine - June 2014 Vol. 16 / No. 5

As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above and beyond compliance requirements. Global threat intelligence services have continued to evolve and play more of role in security information and event management and endpoint security products. More organizations are collecting and analyzing global threat information against vulnerabilities in their IT infrastructure and other assets. We evaluate the value of these services in risk assessment and find out how to take advantage of endpoint intelligence. We also report on the growing trend of community-based threat intelligence services, and look at the puppet masters of malware, command-and-control networks. Columnist Marcus Ranum interviews Avi Rubin about his latest work on shielding medical information systems.   Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • How to respond to the latest distributed denial-of-service attacks
    DDOS_attacks.png
    E-Handbook

    All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...

  • Figuring out FIDO as the first products emerge
    ISM_0514.png
    E-Zine

    The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...

  • Secure file transfer: Send large files fast, but keep your system safe
    secure_file_transfer.png
    E-Handbook

    FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...