<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=254990494906321&amp;ev=PageView&amp;noscript=1">
x

Wednesday, Dec. 2 - 10am PDT

Defense teams must be able to access and interpret online conversations quickly in order to prevent attacks. In this session, we'll walk through examples of foreign language threats and provide helpful insider knowledge.

SAVE MY SEAT

OSINT Tools and Techniques for Business Risk Intelligence

Alex Ciarniello May 12, 2020 OSINT, Information Security, Corporate Security
Investing in business risk intelligence (BRI) has its challenges. Companies are often confronted with budget or staffing constraints when it comes to supporting a robust program—and proponents of upgrading a business risk intelligence strategy can be faced with convincing stakeholders of its value. Read More

5 Situations Where OSINT Tools are Critical for Retail Security

Alex Ciarniello May 05, 2020 OSINT, Retail Security
The term open-source intelligence (OSINT) has been used for decades, usually in the context of defence and intelligence communities. Online networks—from social media platforms to covert dark web forums—have become critical OSINT sources for locating security risks, investigating threats, and evaluating public sentiments. Read More

How to Detect Data Breaches Fast

Alex Ciarniello April 28, 2020 OSINT, Information Security, Data Breaches
Organizations face a 29.6% chance of experiencing a data breach in the next 2 years.  These are the odds that no one can afford to overlook, especially as cyber criminals are expanding their efforts to leverage real-world incidents, like the COVID-19 pandemic, as external attack vectors. Read More

Supply Chain Monitoring: the Value of Social Media Data in a Crisis

Alex Ciarniello April 16, 2020 Retail Security, Social Media Monitoring
One needs only to visit the cleaning supplies aisle of their local retailer in recent weeks to see the impacts of a global crisis on supply chains. Read More

Active Threat Response Strategies: How Informed Is Your Security Team?

Alex Ciarniello April 07, 2020 Event Monitoring, Retail Security, Corporate Security
How effective is your active threat response strategy? Read More

How to Choose an Intelligence Solution: In-House, Services, or Third-Party Platforms?

Alex Ciarniello March 31, 2020 Cyber Security, Corporate Security, Digital Investigation
Even the most security-savvy companies are still at risk for cyber attacks. Where does that leave organizations that lack cybersecurity resources and oversight? Read More

What is Raw Data and Why National Security Depends on it

Alex Ciarniello March 24, 2020 Cyber Security, Emergency Response, Event Monitoring
At the time of writing this article, the world is dealing head-on with the global COVID-19 pandemic. Governments are scrambling to keep up with the situation using real-world data and information. Cyber adversaries—some backed by nation-states—are also weaponizing the illness to target governments, citizens, and their data. Read More

Lifecycle of a Hack: The 5 Stages of a Data Breach

Alex Ciarniello March 10, 2020 Cyber Security, Information Security
If your organization discovers a data breach, it’s likely been weeks or months since the initial attack, according to a 2019 Verizon report. Read More

5 Current Cyber Attack Techniques and How to Stay Threat-Informed

Cybersecurity teams are increasingly taxed with keeping up to the threat actors exploiting digital security vulnerabilities. These vulnerabilities are growing exponentially. Read More

What is Mastodon and Why Should You Care?

Alex Ciarniello February 04, 2020 Open Source Threat Intelligence, Social Media Monitoring
Early in December 2019, Twitter CEO Jack Dorsey announced that the social platform is funding development of “an open and decentralized standard for social media.” Within the hour, Mastodon responded with a virtual eye-roll—it had been three years since it was specifically launched as a decentralized Twitter alternative. Read More