93% of SOC managers unable to triage all potential threats

In mid-2016, Intel Security commissioned a primary research study to gain a deeper understanding of the ways in which enterprises use SOCs, how they have changed over time, and what they will look like in the future. Interviews with nearly 400 security practitioners across several countries, industries and company sizes yielded valuable information on the…

Where Cybercriminals Go To Buy Your Stolen Data

With nothing more than a standard Web browser, cyber-criminals can find personal, private information all over the public Internet. It isn’t just legitimate services – from genealogy sites to public records and social media – that can be mined and exploited for nefarious purposes. Openly malicious criminal activities are also happening on the public Internet….

Fake executive social media accounts threaten enterprises

New research has uncovered numerous duplicative Twitter and LinkedIn accounts among Fortune 500 leaders, raising concerns about potential security vulnerabilities. Analysts at BrandProtect reviewed profiles for the 54 CEOs at Fortune 500 companies using Twitter and the 187 CEOs using LinkedIn. Of these CEOs, 19 percent were represented online by multiple Twitter accounts, while 9…

Integrating threat intelligence with existing security technologies

70 percent of security industry professionals believe threat intelligence is often too voluminous and/or complex to provide actionable insights. The Ponemon Institute study, based on 1,072 respondents in the United Kingdom and North America, also showed that organizations neglect to share essential threat data with board members and C-level executives, despite the fact that security…

Hackers changing tactics, techniques and procedures

Organizations need to conduct better penetration testing to combat continual changes in hackers’ tactics, techniques and procedures (TTPs), according to NTT Security. “Our Q3 2016 report confirms that hackers are relentless and constantly employing new means to penetrate networks to steal confidential data,” said Rob Kraus, Director, Security Research and Strategy, NTT Security. “Organizations’ first…