Sage Advice - Cybersecurity Blog

Why are Cyberattacks in the Healthcare Sector on the Rise?

Healthcare organizations are a favorite target for cybercriminals. In the first quarter of 2018, about 1.13 million patient records were compromised in 110 healthcare data breaches (Protenus Breach Barometer). That’s about one data breach per day.

Read More

Topics: Healthcare, Threat Intelligence

Sage Advice on Threat Intelligence

Approaching the development of a Threat Intelligence Program is akin to any other mission-critical function. It is best managed as an important component of organizational intelligence supporting a business strategy, rather than a “check-box” item. If the latter, this function becomes a dizzying array of dusty relics offering little value, while it consumes time and resources.

Read More

Topics: Threat Intelligence, Information Sharing

A New Role: Threat Intelligence & Information Sharing

As discussed in previous posts, a threat intelligence program can help organizations more quickly understand and effectively respond to the evolving threat environment.  And with this new program, gathering, analyzing, distributing, and sharing threat intelligence has added a whole new list of tasks to the cybersecurity “to-do list.”  Therefore, it's no suprise that one of the top predictions in the McAfee Threat Prediction Report of 2016, was that this function is going to be maturing very rapidly in the coming year.

Read More

Topics: Security Policy, Threat Intelligence, Information Sharing

The Basics of Threat Intelligence Sharing

There is no question that threat intelligence is an essential part of your cybersecurity defense strategy. But it’s not just about monitoring feeds. Sharing the threat intelligence your gather is also a huge component.

Information sharing may be a new concept for many organizations, but hackers having been doing it for years. Their ability to share knowledge throughout the hacker community is one of the things that has made them so successful.  In today’s threat environment, we need to fight fire with fire.  We stand a far better chance of beating back the bad guys if we join forces to collaborate and share information.  

Read More

Topics: Threat Intelligence, Information Sharing

A Guide to Cyber Threat Intelligence Sources

There is widespread acceptance that access to timely cyber threat intelligence is a critical defense strategy in our dynamic cyber threat landscape.  As such, there has been an explosion of potential sources delivering a staggering amount of information.  But the goal of a threat intelligence program is NOT to be able to manage a ton of data.  The goal is to create a program that is both manageable and effective for your organization.  That means you need to limit your sources of threat intelligence.  So which do you choose?

Read More

Topics: Threat Intelligence, Information Sharing

Developing a Cyber Threat Intelligence Program

With cyber-attacks increasing, the likelihood that many organizations are experiencing the same attack is also increasing.  When such an incident occurs, the intelligence gathered – including what happened, how it was dealt with, and lessons that were learned – can teach your organization what to do in the same situation.  In today’s dynamic threat environment, it’s impossible to single-handedly keep on top of everything.  Implementing a threat intelligence program can help you better protect your organization.

Read More

Topics: Security Policy, Threat Intelligence, Information Sharing

Video: The Importance of Threat Intelligence in Detecting Network Threats

By joining forces to collaborate and share information, we stand a far better chance of beating back the bad guys. With threats continuously evolving, this is an on-going and time-consuming responsibility. And if you’re not able to keep up-to-date with the latest threat intelligence, your network could be vulnerable.

Read More

Topics: Log Analysis, Threat Intelligence, Threat Detection Tips