News & Events

In the News

Government Security News

May 12, 2017  |  Government Security News, Steve Bittenbender

Trump Executive Order Draws Praise from Cybersecurity Experts

President Donald Trump on Thursday signed a long-anticipated executive order calling for the federal government to ramp up its cybersecurity measures. And once the announcement was made, it didn’t take long for cybersecurity experts to chime in with their analysis of the order, which among many...
Read More


May 5, 2017  |  theCSuite, Travis Farral

Where To Start with Threat Intelligence Sharing

Threat intelligence is becoming a more ubiquitous feature in information security programs. Companies are investing in threat intelligence technologies and products are adding features around this too. Subsequently, threat intelligence sharing is becoming more mainstream as Information Sharing and Analysis Centres (ISACs) and other industry sharing collectives gain popularity. Although,...
Read More

Network World

April 25, 2017  |  Network World, Jon Oltsik

Cybersecurity Skills Shortage Impact on Technology Innovation

The global cybersecurity skills shortage continues to be a critical issue. For example, ESG research found 45% of organizations report a “problematic shortage” of cybersecurity skills today, more than any other area within IT.Read More
Read More


April 20, 2017  |  Small , Travis Farral

The Importance of Cyber Security Infrastructure Hygiene

Travis Farral, director of security strategy at Anomali runs us through the importance of cyber security hygiene. The importance of network security and its early undertaking is something most businesses are aware of. Yet, what is often dismissed is the fact that maintaining a cyber security infrastructure is an...
Read More


April 12, 2017  |  ITProPortal, Travis Farral

The Power of Collaboration in Bolstering Election Integrity

Following the aftermath of the controversial US election, with rumours still circling regarding Russia’s alleged involvement and experts debating the prickly issue of attribution. Other politically motivated groups, lone wolf actors, Islamic activists and even teenagers looking to make a name for themselves can interfere, impersonate and manipulate...
Read More

eSecurity Planet

April 6, 2017  |  eSecurity Planet, Karen Epper Hoffman

Machines Learning Evolves, and Hackers Stand to Gain

The embrace of AML has created “a very asymmetric warfare for the good guys… the bad guys have [so far] had the benefits on their side,” said Evan Wright, principal data scientist for the threat intelligence company Anomali. “The good guys are forced to block everything....
Read More

Network World

March 27, 2017  |  Network World, Jon Oltsik

Toward Strategic and Proactive Threat Intelligence Programs

Enterprise organizations must move beyond reactive and operational use cases and leverage threat intelligence more aggressivelyIn 2015, ESG did an in-depth research project on cyber threat intelligence usage at enterprise organizations (i.e. more than 1,000 employees).  The goal of this project was to determine how large firms were using...
Read More

CSO Online

March 10, 2017  |  CSO Online, Ryan Francis,

Profiling 10 types of hackers

Hackers, like the attacks they perpetrate, come in many forms, with motivations that range from monetary to political to ethical. Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your...
Read More

SC Magazine

March 1, 2017  |  SC Magazine , Peter Stephenson

Anomali Threatstream receives 5-star rating and ‘Best Buy’ product

Anomali ThreatStream is a threat analysis SaaS platform that also has an on-premises option supplied as a virtual machine for those organizations that don't want to risk a cloud-based deployment. The tool includes over 140 open-source feeds and allows easy inclusion of commercial feeds through the Anomali APP Store. We...

SC Media

February 17, 2017  |  SC Media , Travis Farral

How the events of 2016 could shape the future of democratic elections

Travis Farral discusses the malicious activity that surrounded the US election, addressing Russian actors and examples of other Nation State hacking activity that enterprises can learn from.It's been hard to miss all of the rumours surrounding the recent US election, particularly the speculation surrounding Russia's involvement. Examples...
Read More