Anissa Khalid

Anissa Khalid is the former Head of Global Demand Generation Marketing at Anomali.

More From This author

Free Threat Intel Consolidated at COVID-19 Attacks Resource Center
Free Threat Intel Consolidated at COVID-19 Attacks Resource Center
Published on:
April 8, 2020
Blog

Free Threat Intel Consolidated at COVID-19 Attacks Resource Center

Read More
Anomali Presents the Black Hat 2019 Travel Guide
Anomali Presents the Black Hat 2019 Travel Guide
Published on:
July 11, 2019
Blog

Anomali Presents the Black Hat 2019 Travel Guide

Read More
Anomali at RSA Conference 2019 - Better than Ever
Anomali at RSA Conference 2019 - Better than Ever
Published on:
March 8, 2019
Blog

Anomali at RSA Conference 2019 - Better than Ever

Read More
Detect ‘18 - Who’d Ya Call? Threatbusters!
Detect ‘18 - Who’d Ya Call? Threatbusters!
Published on:
September 27, 2018
Blog

Detect ‘18 - Who’d Ya Call? Threatbusters!

Read More
Anomali Announces New Threat Platform and SDKs at Detect '18
Anomali Announces New Threat Platform and SDKs at Detect '18
Published on:
September 21, 2018
Blog

Anomali Announces New Threat Platform and SDKs at Detect '18

Read More
Verizon Launches Threat Intelligence Platform Service in Partnership with Anomali
Verizon Launches Threat Intelligence Platform Service in Partnership with Anomali
Published on:
June 5, 2018
Blog

Verizon Launches Threat Intelligence Platform Service in Partnership with Anomali

Read More
Anomali at RSA Conference 2018
Anomali at RSA Conference 2018
Published on:
April 19, 2018
Blog

Anomali at RSA Conference 2018

Read More
Anomali Raises $40 Million in Series D Funding
Anomali Raises $40 Million in Series D Funding
Published on:
January 17, 2018
Blog

Anomali Raises $40 Million in Series D Funding

Read More
FTSE 100 Report: Targeted Brand Attacks and Mass Credential Exposures
FTSE 100 Report: Targeted Brand Attacks and Mass Credential Exposures
Published on:
November 30, 2017
Blog

FTSE 100 Report: Targeted Brand Attacks and Mass Credential Exposures

Read More
10 Reasons to be Thankful for a Security Analyst
10 Reasons to be Thankful for a Security Analyst
Published on:
November 22, 2017
Blog

10 Reasons to be Thankful for a Security Analyst

Read More
Anomali Provides Threat-Sharing Expertise Before Congress
Anomali Provides Threat-Sharing Expertise Before Congress
Published on:
November 16, 2017
Blog

Anomali Provides Threat-Sharing Expertise Before Congress

Read More
NCSAM – Dialing in on Cybersecurity Education
NCSAM – Dialing in on Cybersecurity Education
Published on:
October 12, 2017
Blog

NCSAM – Dialing in on Cybersecurity Education

Read More
Detect 2017 Recap
Detect 2017 Recap
Published on:
September 29, 2017
Blog

Detect 2017 Recap

Read More
A Closer Look at the German Election
A Closer Look at the German Election
Published on:
September 28, 2017
Blog

A Closer Look at the German Election

Read More
Addressing Threat Blindness
Addressing Threat Blindness
Published on:
September 21, 2017
Blog

Addressing Threat Blindness

Read More
Improve Security Through People in Four Simple Steps
Improve Security Through People in Four Simple Steps
Published on:
September 7, 2017
Blog

Improve Security Through People in Four Simple Steps

Read More
Anomali Limo – Take the Fast Lane to Threat Intelligence
Anomali Limo – Take the Fast Lane to Threat Intelligence
Published on:
August 24, 2017
Blog

Anomali Limo – Take the Fast Lane to Threat Intelligence

Read More
6 Ways to Help Improve your Security Posture
6 Ways to Help Improve your Security Posture
Published on:
August 10, 2017
Blog

6 Ways to Help Improve your Security Posture

Read More
TAXIIing to the Runway
TAXIIing to the Runway
Published on:
July 12, 2017
Blog

TAXIIing to the Runway

Read More
Anomali Forum – Your Cyber War Room
Anomali Forum – Your Cyber War Room
Published on:
July 5, 2017
Blog

Anomali Forum – Your Cyber War Room

Read More
Anomali Limo – Free Intelligence Feeds
Anomali Limo – Free Intelligence Feeds
Published on:
June 21, 2017
Blog

Anomali Limo – Free Intelligence Feeds

Read More
Targeted vs Indiscriminate Attacks
Targeted vs Indiscriminate Attacks
Published on:
June 15, 2017
Blog

Targeted vs Indiscriminate Attacks

Read More
Anomali Begins Education Outreach Initiative
Anomali Begins Education Outreach Initiative
Published on:
June 8, 2017
Blog

Anomali Begins Education Outreach Initiative

Read More
Global Elections, Global Problems
Global Elections, Global Problems
Published on:
June 1, 2017
Blog

Global Elections, Global Problems

Read More
Ransomware – A Tech or Human Problem?
Ransomware – A Tech or Human Problem?
Published on:
May 24, 2017
Blog

Ransomware – A Tech or Human Problem?

Read More
STAXX 2.3 is Here - Features New Anomali Limo Service
STAXX 2.3 is Here - Features New Anomali Limo Service
Published on:
May 22, 2017
Blog

STAXX 2.3 is Here - Features New Anomali Limo Service

Read More
Maximizing the Potential of Open Source Threat Intelligence Feeds
Maximizing the Potential of Open Source Threat Intelligence Feeds
Published on:
May 11, 2017
Blog

Maximizing the Potential of Open Source Threat Intelligence Feeds

Read More
STIX/TAXII: All Your Questions Answered
STIX/TAXII: All Your Questions Answered
Published on:
May 4, 2017
Blog

STIX/TAXII: All Your Questions Answered

Read More
Why Brand Monitoring is a Security Issue - Compromised Credentials
Why Brand Monitoring is a Security Issue - Compromised Credentials
Published on:
May 3, 2017
Blog

Why Brand Monitoring is a Security Issue - Compromised Credentials

Read More
Why Brand Monitoring is a Security Issue - Typosquatting
Why Brand Monitoring is a Security Issue - Typosquatting
Published on:
April 19, 2017
Blog

Why Brand Monitoring is a Security Issue - Typosquatting

Read More
Ways to Maintain your Cybersecurity Infrastructure
Ways to Maintain your Cybersecurity Infrastructure
Published on:
March 30, 2017
Blog

Ways to Maintain your Cybersecurity Infrastructure

Read More
Doing Threat Intel the Hard Way - Part 6: Threat Intelligence Maintenance
Doing Threat Intel the Hard Way - Part 6: Threat Intelligence Maintenance
Published on:
March 23, 2017
Blog

Doing Threat Intel the Hard Way - Part 6: Threat Intelligence Maintenance

Read More
Explore More Resources