You are viewing 'cyberintelligence'

See below for Solutionary Minds blogs about cyberintelligence.

The NTT Security Global Threat Intelligence Center (GTIC)

Global visibility, leadership and roadmap empowering detection capabilities

Rob Kraus

April 11, 2017 - Posted by Rob Kraus to Threat Intelligence

Threat Intelligence

In a recent press release, NTT Security announced the formation of the Global Threat Intelligence Center (GTIC) as a natural evolution of the previously established Security Engineering and Research Team (SERT). As a founding member of the legacy SERT, and current director within the GTIC organization, I am excited to be part of this next great step.

This move marks a significant point in the future of NTT Security in its ability to address security threats, as NTT Security must bring together its international threat intelligence assets, to further enhance our global capabilities.

The GTIC’s mission, under the leadership of Steven Bullitt (VP Global Threat Intelligence), is to apply actionable and detailed insight with a focus on reducing risk for clients and customers. GTIC will... read more >

Introducing the 2016 Global Threat Intelligence Report

Observations of the Trends and Statistics that Shaped Cybersecurity in 2015

Rob Kraus

April 19, 2016 - Posted by Rob Kraus to Security Insight

2016 Global Threat Intelligence Report

Now in its fourth year of publication, the 2016 Global Threat Intelligence Report (GTIR) highlights observations and details about global threats. In this year’s report we continue tracking trends that have affected our clients over the last few years, as well as identify the new threats that presented themselves in 2015.

This year’s GTIR provides actionable intelligence, guidance about what attackers are doing, and comprehensive security controls designed to disrupt attacks. Controls recommended in this report will contribute to an organization’s survivability and resiliency in the face of an attack.

To develop this year’s annual report, we collaborated with several well-respected organizations, including Lockheed Martin, Recorded Future, Wapack Labs, and the Center for Internet Security. These contributors provided key feedback and observations from their unique perspectives of the cyber... read more >

Surveys Reveal Serious Cybersecurity Gaps Remain

2016 RSA Conference Surveys

George Hulme

March 03, 2016 - Posted by George Hulme to Security Insight

RSA

As readers of this blog are well aware, there are many challenges when it comes to running a successful cybersecurity program. One of the most important is making sure that not only do security teams get the right support they need, but that security managers, CISOs and business executives are all aligned on what the goals of the cybersecurity program are and what must be done to achieve those goals. We recently published a post on some of the personality traits found within enterprises that often hold these efforts back in, “The Seven Deadly Sins of Business and Information Security Alignment.”

While cybersecurity is now reportedly a boardroom level issue – we are not seeing that concern follow through in organizational action. At least we are not seeing this nearly as much as we should, as revealed in a number of surveys released at the... read more >

How Big Data is Advancing Cybersecurity

Brandon Louder

February 18, 2016 - Posted by Brandon Louder to Security Insight

Big Data

How many times have you heard a new technology or startup described as “innovative and revolutionizing,” “value added solution,” “disrupting industry,” or “making the world a better place”? Personally, I’ve heard these descriptions too many times to count. There are not many technologies that I can think back on and say “yep, they were right!” The advancement and application of big data, however, is definitely at the top of my list.

Big data analytics is an old “new” way of analyzing data. The concepts predate existing technologies, with probabilistic and statistical math. In the last few years, however, the technology has improved, making big data analytics simpler and more accessible. This old “new” way has recently become its own field of expertise and has revolutionized several industries.

Big data in the news

Investment banks now have people they lovingly... read more >

0-Day in Linux Kernels: High or Low Threat?

CVE-2016-0728: Evaluating the Threat Level

Jeremy Scott

January 26, 2016 - Posted by Jeremy Scott to Threat Intelligence

Lightbulb Overview

On January 14, 2016 researchers at Perception Point identified a 0-day local privilege escalation vulnerability (CVE-2016-0728) in Linux Kernel versions 3.8 to 4.4 (2012 – 2016). This flaw exists due to the kernel’s keyrings security facility used to retain cached security data, authentication keys, encryption keys and other data. Using a local user account, one can free a referenced keyring object and overwrite it to be executed in the kernel, escalating privileges to root. Based on statistics provided by Perception Point, tens of millions of personal computers (PCs), servers and 66% of all Android devices may be vulnerable.

The Solutionary Security Engineering... read more >

1 | 2 | 3 | 4 | Older Entries >>

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)

LATEST TWEETS