Blog

Category: Research

Data Privacy in a World of Outsourced Artificial Intelligence

Artificial intelligence(AI) and deep learning can lead to powerful business insights.  Many executives are ready to harness the power of this technology but one main challenge holds them back.  Hiring technical talent for cybersecurity is hard enough in itself; hiring technical talent for AI is a much...

Read More

The Definitive Guide to Sharing Threat Intelligence

Threat Intelligence sharing is becoming more mainstream as ISACs and other industry sharing collectives gain popularity. As intelligence sharing becomes more popular, there are some things to consider to get the most out of it. Anomali’s new whitepaper, The Definitive Guide to Threat Intelligence Sharing explores this topic...

Read More

Why Brand Monitoring is a Security Issue - Typosquatting

Corporate brands are generally thought of as intangible objects that carry the company’s image and reputation. However, your brand is very tangible in the eyes of attackers and can absolutely be targeted and damaged with cyber threats. To prevent such damage, companies can engage in “brand monitoring...

Read More

Shedding Some Light on the Dark Web

Underground markets may have originated in the time of Internet Relay Chats (IRCs), but the appearance of cryptocurrencies and anonymous communications like Bitcoin and Tor have allowed these markets to develop far past their genesis. Darknet forums are now a very efficient platform through which to conduct illegal business....

Read More

3 Most Common Pitfalls When Implementing Threat Intelligence and How to Avoid Them

Executive SummaryEffective threat intelligence requires a combination of sources and techniques, analysts to interpret data, and a platform through which to manage and leverage data. Many people will unwittingly fall into a “threat intelligence trap” when trying to implement a successful threat intelligence program.Despite having access...

Read More

Ways To Maintain Your Cybersecurity Infrastructure

Network security is a great undertaking early on. The benefits to protecting your network are immediate as well as beneficial in the long term. However, the systems and practices which defend your organization and its network are not a “set it and forget it” machine. As threats are...

Read More

Machine Learning for Cybersecurity

Sam Charrington, host of Machine Learning & Artificial Intelligence (TWiML & AI) podcast and Evan Wright Principal Data Scientist at Anomali discuss a number of topics surrounding the use of machine learning in cybersecurity. These topics include: ​ The three big problems in cybersecurity that Machine...

Read More

Teach A Man to Phish

In the world of credential theft, phishing continues to be a popular method of attack. All that a cybercriminal needs to start are saved and modified login pages of a web site and some clever social engineering. Once the desired page is set up (often using throw-away or compromised domains)...

Read More

Decreasing Dwell Time - How Long Intruders Go Undetected

The evaluation of technical threat intelligence data is a nascent art. When evaluating Indicator sources many focus on counting the number of indicators the source has. The next step in evaluating indicator sources is usually based upon the number of True Positive alerts generated by the IoCs compared to the...

Read More

Anomali Publishes Comprehensive Study of 2016 Election Hack

Today Anomali released an in-depth research report detailing the 2016 election hacks, "Election Security in an Information Age". The report, authored by Anomali Director of Security Stategy Travis Farral (former Head of Threat Intelligence at ExxonMobil), collects all publicly known information about the election hacks and condenses this into a...

Read More

Get the latest threat intelligence news in your email.