article thumbnail

Importance of having a Threat Intelligence Platform

CyberSecurity Insiders

However, as manual track down of threats is impossible, due to sheer volumes of data, analysts use an automated form of software that assists them in collecting, analyzing and sharing information with the teams to ensure identity and prevention of harm from attacks.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Assessing the risks involved in using the latest technology is something our culture had to adopt in the early days of the computer. New technologies come with risks — there’s no denying that. military officials hired data analysts to crack the Japanese secret code known as JN-25. The Creeper Virus (1971).

article thumbnail

Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed

eSecurity Planet

Aqua Security lead threat intelligence and data analyst Assaf Morag told eSecurity Planet by email that it’s crucial for companies of all sizes to have a defined point of contact for security researchers and a known security disclosure playbook.