Articles

October 20, 2023

5 New Cybersecurity Challenges Chief Security Officers (CSOs) Should Be Aware of in 2023
5 New Cybersecurity Challenges Chief Security Officers (CSOs) Should Be Aware of in 2023 

If you're a chief security officer (CSO), chief information security officer (CISO), or other cybersecurity leader, your job is never dull. Technology is constantly evolving, as are the threats to an organization's data and intellectual property. No chief security officer can rest on their laurels because each year brings new challenges. And 2023 is shaping up to be one of the most challenging years yet.

Read article
Why TRIKE is the Most Popular Threat Modeling Methodology 

Threat modeling is a powerful strategy for pinpointing your organization's cybersecurity risks and possible attacks, helping protect your IT environment, and offering solutions for different scenarios. In particular, the TRIKE model is an open-source threat modeling methodology that helps organizations identify and prioritize potential security risks and vulnerabilities and develop strategies to mitigate or manage them.

Read article
Complete Guide to Cyberthreat Intelligence Feeds And Sources
Popular Cyberthreat Intelligence Feeds and Sources – Explained 

Threat intelligence has become incredibly popular in recent years. This is largely a result of how sophisticated and pervasive cyberthreats have become. To identify and protect against these attacks, enterprises increasingly turn to threat intelligence and analysts. This blog sheds light on two well-known cyberthreat intelligence feeds and how they can help your organization protect itself from cyberattacks.

Read article