At CyberSift we strive to turn threat data into threat intelligence. These two are not one and the same, there is a subtle difference which we can summarize succinctly as follows: threat data + context = threat intelligence One of the best ways to add context to alerts that get sent to a security analyst … Continue reading Using Twitter as a source of Indicators of Compromise
The importance of data mining in the field of cybersecurity
In a very interesting article on TechCrunch, Michael Schiebel writes about the various ways in which security analysts can learn from data scientists. He makes a couple of points that are worth highlighting. Today, hacking is a much more complex art than it used to be: It no longer only involves just scanning and penetrating … Continue reading The importance of data mining in the field of cybersecurity
You must be logged in to post a comment.