Dealing With Short Search Terms When Using DNSDB Flexible Search
The initial launch of Farsight Security’s DNSDB® allowed users to search for patterns in passive DNS expressions. Built with ease of use in mind, DNSDB allows security teams to pivot …
The initial launch of Farsight Security’s DNSDB® allowed users to search for patterns in passive DNS expressions. Built with ease of use in mind, DNSDB allows security teams to pivot …
Few topics in the field of Cyber Threat Intelligence (CTI) prompt as much passion and debate as the concept of threat attribution. From numerous conference talks, to blogs and papers, …
Key Takeaways From the SolarWinds Breach The SolarWinds hack has presented a cybersecurity reckoning at a scale never before seen for the US government and private enterprises. While the width …
What is Security Information and Event Management (SIEM)? Security Information and Event Management (SIEM) is an approach to security management that combines security information management (SIM) and security event management …
Research conducted by ESG found that 58% of organizations have a threat intelligence program, however with a reliance on manual processes and incompatible tools, organizations struggle to realize the value …
There is an increasing chasm between the number of qualified cybersecurity professionals and the number of people needed to fill those roles. DomainTools is a vendor that seeks to address …
Blocking against all phishing attempts is costly, time intensive and arguably impossible. This paper will discuss how to get ahead of Phishing scams and the spear phisher’s infrastructure and techniques. …
Is it possible to overcome the daunting challenge of knowing everything that’s going on inside and outside the network? Tarik Saleh, Senior Security Engineer at DomainTools believe the answer is …
Cyberattacks are a top priority in most IT organizations; the risk associated with ransomware attacks, data breaches, business email compromise, and supply chain attacks has garnered that significant attention be …
There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus on are harder to find. In …
