Quantcast
Channel: Josh Ray - CircleID
Browsing latest articles
Browse All 8 View Live

Recommendations for Adding Cybersecurity Intelligence to the Smart Grid...

Over the last few years, there has been an increased effort to modernize the U.S. electric grid. Building a "Smart Grid" has been central in the effort to help utilities better manage their resources,...

View Article



Six Approaches to Creating an Enterprise Cyber Intelligence Program...

As few as seven years ago, cyber-threat intelligence was the purview of a small handful of practitioners, limited mostly to only the best-resourced organizations - primarily financial institutions that...

View Article

Why Attribution Is Important for Today's Network Defenders (Featured Blog)

It makes me cringe when I hear operators or security practitioners say, "I don't care who the attacker is, I just want them to stop." I would like to believe that we have matured past this idea as a...

View Article

Understanding the Threat Landscape: Cyber-Attack Actors and Motivations...

The threat landscape has rapidly expanded over the past few years, and shows no signs of contracting. With major establishments in both the public and private sectors falling victim to cyber-attacks,...

View Article

Understanding the Threat Landscape: Indicators of Compromise (IOCs)...

I previously provided a brief overview of how Verisign iDefense characterizes threat actors and their motivations through adversarial analysis. Not only do security professionals need to be aware of...

View Article


Understanding the Threat Landscape: Basic Methodologies for Tracking Attack...

The indicators of compromise (IOCs) outlined in my last blog post can be used as a baseline for developing intrusion sets and tracking attack campaigns and threat actors. When launching an attack,...

View Article

How to Choose a Cyber Threat Intelligence Provider (Featured Blog)

Throughout the course of my career I've been blessed to work with some of the most talented folks in the security and cyber threat intelligence (CTI) mission space to create a variety of different...

View Article

The Cyberthreats and Trends Enterprises Should Watch in 2016 (Featured Blog)

Every year, Verisign iDefense Security Intelligence Services produces its Cyberthreats and Trends Report, which provides an overview of the key cybersecurity trends of the previous year and insight...

View Article

Browsing latest articles
Browse All 8 View Live




Latest Images