Nadir Izrael, Co-Founder & CTO, Armis explains how AI-powered threat intelligence can better protect critical infrastructure and national security, as Australian organisations face enhanced cyber security obligations.
The Voice of Cyberยฎ
Threat Intelligence
Threat Intelligence is a cornerstone of effective cybersecurity involving the collection, analysis, and dissemination of information about potential cyber threats to inform decision-making and enhance an organisation’s security posture. Threat intelligence encompasses data on emerging vulnerabilities, attack techniques, and the tactics employed by threat actors.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Agnidipta Sarkar, VP CISO Advisory, explores how Nassim Taleb's concept of antifragility enhances cyber defense strategies.
As Black Friday and Cyber Monday deals continue throughout the holiday season, millions of consumers will log on to snag the best offers of the year. But they arenโt the only ...
In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the ...
On September 23rd, Twitter userย Simone Margaritelli (@evilsocket) announcedย that he has discovered and privately disclosed a CVSS 9.9 GNU/Linux unauthenticated RCE, which ...
Cyber Security Awareness Month highlights the need for individual responsibility to secure their own account and devices. Beyond foundational measures, businesses need ...
Discover how insider threat incidents like the Avis cyberattack challenge organizations and how strategies like microsegmentation can help.
In The News
Sort By
- Date
- Title
January 23, 2025 โ Trustwave, a leading cybersecurity and managed security services provider,ย has released a series of reports detailing the threats facing the energy and ...
Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deployย phishing campaigns.
The rapid rise and evolution ...
BENGALURU:ย CloudSEK, a leader in AI-powered cybersecurity solutions, hasย uncoveredย how cybercriminals can exploit a seemingly simple feature of Zendeskโs SaaS ...
Emulators such as the open-source, cross-platform QEMU framework are invaluable tools for researchers conducting vulnerability research. QEMU and other emulators act as great ...
CyberArkย (NASDAQ:ย CYBR) today announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organisations a ...
Microsoft patched a whopping 157 CVEs in its inaugural Patch Tuesday for 2025. Not only is this the largest number of CVEs patched in January, it is the largest number of ...
Podcasts On Threat Intelligence