News & Events

In the News

Small Business.co.uk

April 20, 2017  |  Small Business.co.uk , Travis Farral

The Importance of Cyber Security Infrastructure Hygiene

Travis Farral, director of security strategy at Anomali runs us through the importance of cyber security hygiene. The importance of network security and its early undertaking is something most businesses are aware of. Yet, what is often dismissed is the fact that maintaining a cyber security infrastructure is an...
Read More

March 27, 2017  | 

Toward Strategic and Proactive Threat Intelligence Programs

Enterprise organizations must move beyond reactive and operational use cases and leverage threat intelligence more aggressivelyIn 2015, ESG did an in-depth research project on cyber threat intelligence usage at enterprise organizations (i.e. more than 1,000 employees).  The goal of this project was to determine how large firms were using...
Read More

CSO Online

March 10, 2017  |  CSO Online, Ryan Francis,

Profiling 10 types of hackers

Hackers, like the attacks they perpetrate, come in many forms, with motivations that range from monetary to political to ethical. Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your...
Read More

SC Magazine

March 1, 2017  |  SC Magazine , Peter Stephenson

Anomali Threatstream receives 5-star rating and ‘Best Buy’ product

Anomali ThreatStream is a threat analysis SaaS platform that also has an on-premises option supplied as a virtual machine for those organizations that don't want to risk a cloud-based deployment. The tool includes over 140 open-source feeds and allows easy inclusion of commercial feeds through the Anomali APP Store. We...

SC Media

February 17, 2017  |  SC Media , Travis Farral

How the events of 2016 could shape the future of democratic elections

Travis Farral discusses the malicious activity that surrounded the US election, addressing Russian actors and examples of other Nation State hacking activity that enterprises can learn from.It's been hard to miss all of the rumours surrounding the recent US election, particularly the speculation surrounding Russia's involvement. Examples...
Read More

February 14, 2017  | 

Anomali Announces Cybersecurity Updates, Phishing Protection

Anomali announced a host of new updates to its threat intelligence platform on Monday, including the addition of a detection service to halt damaging email-based phishing attacks. Previously known as ThreatStream, Anomali provides a suite of Software-as-a-Service (SaaS) solutions that aim to pinpoint threat indicators in real-time. Anomali unveiled...
Read More

Bank of England

February 10, 2017  |  Bank of England, Bank of England

Bank of England works with Anomali to improve threat intelligence capabilities

​The Bank of England FinTech Accelerator recently ran a proof of concept looking at innovative technologies that collect, integrate, hunt and investigate cyber security intelligence data. Following the successful completion of this proof of concept, the Bank has decided to continue to work with Anomali to monitor and mitigate efforts...
Read More

CSOOnline

February 3, 2017  |  CSOOnline , CSO Staff

Hacking the 2016 Election: A Timeline

History has yet to judge the 2016 presidential election, but from where we sit in the early days of 2017, it’s hard to imagine that it will ever be relegated to a footnote.From how spectacularly polling failed to predict the election’s outcome to how the election was...
Read More

InformationAge

January 27, 2017  |  InformationAge, Nick Ismail

Nation State hacking: a long history?

Among the many scandals that pervaded the US election, the notion of state sponsored hacking was a theme that dominated candidate rhetoric and media coverage the most.Volatility and uncertainty parallel an era of innovation and opportunity. The US election brought this strange reality that the world finds itself in,...
Read More

TechTarget

January 11, 2017  |  TechTarget, Michael Heller

Insecure MongoDB configuration leads to boom in ransom attacks

Cybercriminals have found weaknesses in many MongoDB configurations that have opened the door to tens of thousands of ransom attacks.Niall Merrigan, security researcher and Microsoft developer based in Norway, has been tracking the MongoDB ransom incidents, and in one day, he saw the number of...
Read More