Access your Pro+ Content below.
Threat intelligence and risk: Why cybersecurity hangs in the balance
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above and beyond compliance requirements. Global threat intelligence services have continued to evolve and play more of role in security information and event management and endpoint security products. More organizations are collecting and analyzing global threat information against vulnerabilities in their IT infrastructure and other assets. We evaluate the value of these services in risk assessment and find out how to take advantage of endpoint intelligence. We also report on the growing trend of community-based threat intelligence services, and look at the puppet masters of malware, command-and-control networks. Columnist Marcus Ranum interviews Avi Rubin about his latest work on shielding medical information systems.
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Learn how threat intelligence plays into global risk assessment as more security officers are tasked with damage control.
As threat intelligence communities multiply, it may be time to revisit crowdsourcing security.
Are there shadow networks within your enterprise? Stop malware by shutting down command-and-control communication channels.
This Beyond the Page explores the latest advances in threat intelligence and related technology, including threat information sharing services, SIEM and endpoint security products.
Columns in this issue
Threat intelligence can shine a light on important security holes.
Medical data is the next frontier, Avi Rubin tells Marcus Ranum, as Johns Hopkins University seeks to insulate medical information systems from hackers.
How to evaluate whether PCI DSS is lowering credit card fraud and the risks associated with data breach disclosure.