Joe Franscella

Joe Franscella is the former Vice President of Corporate Communications at Anomali.

More From This author

Is XDR Right for Your Enterprise? To Answer the Question, You Need to Know What XDR Is
Is XDR Right for Your Enterprise? To Answer the Question, You Need to Know What XDR Is
Published on:
December 9, 2021
Blog

Is XDR Right for Your Enterprise? To Answer the Question, You Need to Know What XDR Is

Read More
The COVID-19 Pandemic Changed Everything, Can You Detect the New Normal?
The COVID-19 Pandemic Changed Everything, Can You Detect the New Normal?
Published on:
July 29, 2021
Blog

The COVID-19 Pandemic Changed Everything, Can You Detect the New Normal?

Read More
Forrester Tech Tide for Threat Intelligence Recognizes Anomali
Forrester Tech Tide for Threat Intelligence Recognizes Anomali
Published on:
May 19, 2021
Blog

Forrester Tech Tide for Threat Intelligence Recognizes Anomali

Read More
Detect LIVE Virtual Event Series Kicks Off Tomorrow, Showcasing the Latest in Threat Intelligence, Detection, and Response
Detect LIVE Virtual Event Series Kicks Off Tomorrow, Showcasing the Latest in Threat Intelligence, Detection, and Response
Published on:
November 18, 2020
Blog

Detect LIVE Virtual Event Series Kicks Off Tomorrow, Showcasing the Latest in Threat Intelligence, Detection, and Response

Read More
Cybersecurity Awareness Month Starts Today, #BECYBERSMART
Cybersecurity Awareness Month Starts Today, #BECYBERSMART
Published on:
October 1, 2020
Blog

Cybersecurity Awareness Month Starts Today, #BECYBERSMART

Read More
Anomali Automation Streamlines Investigations, Eases Threat Intelligence Analyst Workloads
Anomali Automation Streamlines Investigations, Eases Threat Intelligence Analyst Workloads
Published on:
August 25, 2020
Blog

Anomali Automation Streamlines Investigations, Eases Threat Intelligence Analyst Workloads

Read More
Everything You Need to Know to Become a Guardian of the Cyberverse!
Everything You Need to Know to Become a Guardian of the Cyberverse!
Published on:
August 28, 2019
Blog

Everything You Need to Know to Become a Guardian of the Cyberverse!

Read More
Black Hat: What's in a Name
Black Hat: What's in a Name
Published on:
August 1, 2019
Blog

Black Hat: What's in a Name

Read More
Cyber Threat Intelligence Saves Enterprises Millions
Cyber Threat Intelligence Saves Enterprises Millions
Published on:
June 27, 2019
Blog

Cyber Threat Intelligence Saves Enterprises Millions

Read More
Anomali Adds DomainTools Iris to APP Store
Anomali Adds DomainTools Iris to APP Store
Published on:
June 19, 2019
Blog

Anomali Adds DomainTools Iris to APP Store

Read More
Data Breach Costs: Scare Tactic No More
Data Breach Costs: Scare Tactic No More
Published on:
May 23, 2019
Blog

Data Breach Costs: Scare Tactic No More

Read More
Building Raspberry Pi Honeypots on a Budget
Building Raspberry Pi Honeypots on a Budget
Published on:
September 27, 2016
Blog

Building Raspberry Pi Honeypots on a Budget

Read More
The Best Threat Intelligence Feeds
The Best Threat Intelligence Feeds
Published on:
September 20, 2016
Blog

The Best Threat Intelligence Feeds

Read More
10 Malware Facts Corrected
10 Malware Facts Corrected
Published on:
September 19, 2016
Blog

10 Malware Facts Corrected

Read More
Threat Intelligence Feeds Can Help in Unexpected Ways
Threat Intelligence Feeds Can Help in Unexpected Ways
Published on:
September 16, 2016
Blog

Threat Intelligence Feeds Can Help in Unexpected Ways

Read More
How a Cybersecurity Stack Can Protect Your Network
How a Cybersecurity Stack Can Protect Your Network
Published on:
September 14, 2016
Blog

How a Cybersecurity Stack Can Protect Your Network

Read More
A Brief History of Threat Analytics
A Brief History of Threat Analytics
Published on:
September 13, 2016
Blog

A Brief History of Threat Analytics

Read More
Best Practices for Threat Intelligence Management
Best Practices for Threat Intelligence Management
Published on:
September 12, 2016
Blog

Best Practices for Threat Intelligence Management

Read More
How to Determine if You Have an Outdated Cybersecurity Infrastructure
How to Determine if You Have an Outdated Cybersecurity Infrastructure
Published on:
September 2, 2016
Blog

How to Determine if You Have an Outdated Cybersecurity Infrastructure

Read More
Cyber Intelligence: Your Rights and Responsibilities
Cyber Intelligence: Your Rights and Responsibilities
Published on:
August 18, 2016
Blog

Cyber Intelligence: Your Rights and Responsibilities

Read More
Putting Your TAXII Server to Work
Putting Your TAXII Server to Work
Published on:
August 16, 2016
Blog

Putting Your TAXII Server to Work

Read More
What's in a Threat Feed?
What's in a Threat Feed?
Published on:
August 11, 2016
Blog

What's in a Threat Feed?

Read More
Getting Started with Open Source Cyber Threat Intelligence
Getting Started with Open Source Cyber Threat Intelligence
Published on:
August 10, 2016
Blog

Getting Started with Open Source Cyber Threat Intelligence

Read More
The Aftermath of a Malicious Python Script Attack
The Aftermath of a Malicious Python Script Attack
Published on:
August 4, 2016
Blog

The Aftermath of a Malicious Python Script Attack

Read More
5 Ways to Prevent an Untargeted Attack
5 Ways to Prevent an Untargeted Attack
Published on:
July 27, 2016
Blog

5 Ways to Prevent an Untargeted Attack

Read More
The Anomali Products Suite
The Anomali Products Suite
Published on:
July 26, 2016
Blog

The Anomali Products Suite

Read More
The ROI Behind Threat Intelligence
The ROI Behind Threat Intelligence
Published on:
July 25, 2016
Blog

The ROI Behind Threat Intelligence

Read More
What Happens To Your Data Without Cybersecurity
What Happens To Your Data Without Cybersecurity
Published on:
July 8, 2016
Blog

What Happens To Your Data Without Cybersecurity

Read More
What is ShockPot and How Can It Keep You Safe?
What is ShockPot and How Can It Keep You Safe?
Published on:
June 28, 2016
Blog

What is ShockPot and How Can It Keep You Safe?

Read More
Are You at Risk of Python Malware?
Are You at Risk of Python Malware?
Published on:
June 24, 2016
Blog

Are You at Risk of Python Malware?

Read More
Data Breach Detection: How It Works and Why You Need It
Data Breach Detection: How It Works and Why You Need It
Published on:
June 13, 2016
Blog

Data Breach Detection: How It Works and Why You Need It

Read More
4 Important Facts About Threat Intelligence
4 Important Facts About Threat Intelligence
Published on:
June 10, 2016
Blog

4 Important Facts About Threat Intelligence

Read More
How To Make Your Modern Honeypot an Enterprise Defense
How To Make Your Modern Honeypot an Enterprise Defense
Published on:
May 31, 2016
Blog

How To Make Your Modern Honeypot an Enterprise Defense

Read More
4 Tools For The Best Cyber Threat Management
4 Tools For The Best Cyber Threat Management
Published on:
May 25, 2016
Blog

4 Tools For The Best Cyber Threat Management

Read More
The Truth About the Dangers of Malware
The Truth About the Dangers of Malware
Published on:
May 23, 2016
Blog

The Truth About the Dangers of Malware

Read More
How To Choose The Right Threat Intelligence Platform For You
How To Choose The Right Threat Intelligence Platform For You
Published on:
May 17, 2016
Blog

How To Choose The Right Threat Intelligence Platform For You

Read More
Learn How To Standardize Threat Intelligence With STIX And TAXII
Learn How To Standardize Threat Intelligence With STIX And TAXII
Published on:
May 13, 2016
Blog

Learn How To Standardize Threat Intelligence With STIX And TAXII

Read More
Targeted Attack Vs. Untargeted Attack: Knowing The Difference
Targeted Attack Vs. Untargeted Attack: Knowing The Difference
Published on:
May 12, 2016
Blog

Targeted Attack Vs. Untargeted Attack: Knowing The Difference

Read More
Digging into the Darknet: How to Spy on the Enemy
Digging into the Darknet: How to Spy on the Enemy
Published on:
January 19, 2016
Blog

Digging into the Darknet: How to Spy on the Enemy

Read More
STIX/TAXII Hacks: 4 Things You Need to Know
STIX/TAXII Hacks: 4 Things You Need to Know
Published on:
December 16, 2015
Blog

STIX/TAXII Hacks: 4 Things You Need to Know

Read More
Explore More Resources