member sign-in
Forgot password? Create new account Close

Threat Management


Threat management is an approach to network and information security which integrates a number of different approaches to threats designed to mitigate the risk and protect the assets of an organization or individual. There are a number of approaches which can be integrated into a successful threat management strategy, and several technologies specialized in providing solutions on setting up these types of systems.

Web Application Security

Under this topic, there is information about security of applications and web sites and about technologies that control, monitor, filter and secure web traffic. ...

Messaging Security

Messaging security category contains all the information related with messaging: antispam solutions, malware scanning solutions, technology updates in this market segment, data leaking prevention solutions which will allow you to better understant what kind ...

Database Security

Database security represents a system comprised of systems, procedures and processes intended to protect the databases from unintended activity, whether it refers to authenticated users with unintended usage, malicious attacks or unintended mistakes made by legitimate users ...

Data Security

Data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data. ...

Network and Telecommunication Security

Network and Telecommunication Security represents the security of data communications over private and public  networks. ...

Platform / System Security

Platform / System  Security technologies block malware, defend against cybercriminal activity, and safeguard your the endpoints - both on and off the network. ...

Advanced Persistent Threat

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper suscipit lobortis nisl ut aliquip ex ea commodo consequat....


  • Amid Wave of Hacks, Businesses Need to Identify Top Risks, Says FireEye CEO

    Businesses are facing an onslaught of cyberattacks, especially ransomware. If they want to respond they need to change not just their technology but their approach to cybersecurity risks, according to FireEye CEO Kevin Mandia. Mandia, speaking at the CDW Managing Risk Summit in Washington, D.C., says that the cybersecurity firm will soon release its annual “M Trends” report on the investigations it conducted in 2016. The firm conducted more than 500 investigations in 17 countries last year. Mandia says that if the original victim of an attack ...

    read all
  • Modern Messaging OPSEC: Popular App Gives Scammers a Boost

    Modern messaging apps, many of which offer end-to-end encryption, are used every day by millions of people. These apps come with the expectation of privacy. However, we recently observed an interesting operational security issue involving one such popular messaging app, Telegram. We're posting our observations to alert users of this app to potential privacy concerns. Changing Scammer Tactics Relentless calls from telemarketing scammers are a bane of existence in modern life. Whether it's the "can you hear me now" scam, fake charity scams, ...

    read all
  • Implementing an Intelligence-led Cyber Security Program

    Through Mandiant’s numerous global consulting engagements, we have had the opportunity to see countless cyber security programs of all shapes and sizes. One consistent takeaway from these engagements is the need and desire to develop or enhance integration of cyber threat intelligence (CTI) – not just into cyber security programs, but also into an organization’s larger operational risk practices. CTI is more than just raw data and information being collected from various internal or external sources. As Gartner puts it, “Threat Intelligence ...

    read all
  • 20 Questions for SecOps Platform Providers

    Security operations capabilities for the masses is long overdue. Here's how to find a solution that meets your budget and resources.   The security operations platform is quickly emerging as a favorite talking point for 2017, even for organizations that do not find themselves with an expansive budget to improve their security maturity and posture. Of course, doing so is a complex undertaking with a wide variety of moving parts. Or is it? Historically, advanced SecOps has been beyond the reach and resources for all but the most elite organizations. ...

    read all
  • The Cyber-Intelligence Nexus: Russia’s Use of Proxies

    What if network defenders knew that a cyber operation occurred during Moscow business hours, that it involved a Russian IP address, and that the cyber actors used a Cyrillic keyboard? Would those indicators by themselves be enough for attribution?  Given the Russian cyber environment, the answer is clearly “no.” Those indicators could be shared by any of the cyber actors in Russia, with or without the support of the Russian government, or by other worldwide actors trying to masquerade as Russians.  The Russian government itself is advanced ...

    read all