Tag selected: Threat Intel Tools
Roast the perfect blend of automation and human intelligence
For those who enjoy a good cup of coffee, many more would surely choose a barista-made brew than take their chances from a vending machine. Automation, so the argument goes, is not a panacea. This coffee analogy is often brought out in debates about the emergence of security automation...
Shining a light on the darknet
A common visualization for the Internet is an iceberg. The indexed ‘surface’ web is less than 10% of what is visible, but 90% is non-indexed and known as the deep web. A small subset of the deep web includes hidden information and services: the dark web, or darknet. It’s...
Real-time threat detection and why timing is the key to threat intelligence
You wouldn’t sit idle under siege. However, when it comes to confronting real-time cyberthreats, it is what some businesses are doing – oftentimes without even realizing it. Organizations are increasingly finding themselves targets of cybercrime, carried out by hacktivists, nation states, or financially motivated criminals. In fact, on average...
Threat intelligence tools your cybersecurity team needs
Threat intelligence (TI) is a vital capability for any IT security department. If used effectively, it can offer CISOs the ability to take security from a reactive to a proactive posture, enabling them to better manage cyber risk and support the business-wide digital transformation agenda. But the major caveat...
corporate-blueliv
An open and agile malware analysis sandbox, the new community feature
Blueliv has always been focused on trying to make Cyber Intelligence available for everyone and believes that sharing intelligence is the key to get the upper hand in an ever-changing war on cyber crime. We began with the free Cyber Threat Intelligence API, so you could feed your systems...
Demo Free Trial Community Newsletter