Threat intelligence Orchestration with and without intelligence: What’s the difference?

How best to use orchestration and automation in cyber security operations is a question that many CISOs have been asking …

Artificial Intelligence Over 30 years after the ‘first’ attack, the cyber threat landscape reaches the next...

The world’s’ first cyber-attack’ hit the headlines in 1988. It was the Morris Worm – a personal project of the …

Podcast “We’ve seen a marked increase in social engineering attacks”

On this episode of the teissPodcast, we talk to Richard Cassidy, Senior Director Security Strategy EMEA at Exabeam about threats …

Podcast “Our industry needs critical thinkers” – Chris Hallenbeck, CISO Americas, Tanium

It’s back to Nashville, Tennessee this week on the teissPodcast as I speak with Chris Hallenbeck, CISO for the Americas …

Cyber warfare For caught in the crossfire of cyberwarfare

Dr Sandra Bell, Head of Resilience Consulting EMEA, Sungard Availability Services, provides an overview of how the topic of state-backed …

Information security Five ways threat intelligence can supercharge security

Karen Levy, Senior Director Product and Client Marketing at Recorded Future, considers the 5 ways organisations can use threat intelligence …

Information security 86% of EU businesses feel vulnerable to data threats

The Thales Europe Data Threat Report 2019 has been released and reveals that over 84% of organisations in Europe use …

Information security Understanding cyber threats: why visibility is key to enterprise security

TEISS guest blogger, Piers Wilson of Huntsman Security,  explains why the key to organisational information security is having the right …

Threat intelligence Sharing intel: joining your threat intelligence community

As threat intelligence becomes more ubiquitous, many organisations are discovering that sharing threat intelligence information is powerful in combating cyber-attacks. …

Threat intelligence The San Fran interviews: Darktrace’s Director for Cyber Intelligence and Analysis says we’re not...

There is a lot of focus on the potential external threats to a business, but the “insider threat” could be …

Threat intelligence Start-up stories. “Don’t overestimate the competition” – Tessian’s CEO, Tim Sadler

As part of our 'Start-ups and their Stories' series, TEISS talks with Tessian's co-Founder and CEO, Tim Sadler, about their …

Information security Honeypots 2.0: A New Twist on Classic Deception Technologies

by Lane Thames, senior security researcher with Tripwire’s Vulnerability and Exposure Research Team The concept of honeypots and deception has …