article thumbnail

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

CSO Magazine

Editor's note: This article, originally published on July 3, 2019, has been updated with a directory of ISACs and ISAOs.] An Information Sharing and Analysis Center (ISAC) is an industry-specific organization that gathers and shares information on cyber threats to critical infrastructure. ISAC and ISAO definition.

article thumbnail

The strong link between cyber threat intelligence and digital risk protection

CSO Magazine

While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyber threat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber threat intelligence programs: Still crazy after all these years

CSO Magazine

When I asked CISOs about their cyber threat intelligence (CTI) programs about five years ago, I got two distinct responses. Large, well-resourced enterprises were investing their threat intelligence programs with the goal of better operationalizing it for tactical, operational, and strategic purposes.

article thumbnail

Attributes of a mature cyber-threat intelligence program

CSO Magazine

Survey respondents were asked questions about their organization’s cyber-threat intelligence (CTI) program – how it was staffed, what types of skills were most important, its challenges and strategies, spending plans, etc. To read this article in full, please click here more than 1,000 employees).

article thumbnail

Threat intelligence programs poised for growth

CSO Magazine

In my last CSO article , I detailed cybersecurity professionals’ opinions on the characteristics of a mature cyber-threat intelligence (CTI) program. To read this article in full, please click here

CSO 105
article thumbnail

BrandPost: Scary Cyber Threats and Sweet Solutions

CSO Magazine

What is even scarier: Not having systems in place to protect against malware and other cyber threats. Cyber Threats That Frighten Even The Experts. It's not just malware that poses a threat to an enterprise's systems. Sweet Solutions to Cyber Threats. To read this article in full, please click here

article thumbnail

Office of the Director of National Intelligence highlights cyber threats in 2023 Intelligence Threat Assessment

CSO Magazine

The ODNI minced no words as they addressed China, Russia, North Korea, and Iran as the key nation-states responsible for cyber threats and then continued to highlight other non-state actors that are equally worthy of our attention in the 2023 Threat Assessment. To read this article in full, please click here