A Strategy for Enterprise Sharing & Collaboration

A Strategy for Enterprise Sharing & Collaboration

Kobi Freedman Enterprise

Things are really gearing up in the security industry around the concept of security collaboration and threat intelligence sharing. We are aware of the importance of threat intelligence to mitigate the increasing sophistication of cyber threats, 75% of firms see this as a top priority according to  Forrester research. However, the sharing of this threat intelligence data is now also starting …

Green is the New Black: Cybercrime Hacks Our Green Credentials

Green is the New Black: Cybercrime Hacks Our Green Credentials

Kobi Freedman Enterprise

Green technology is growing. A report published in late 2014 by World Bank Group entitled “Building Competitive Green Industries” looked at the technology opportunities of building and using green technology. The report highlights that investment across 15 clean technology sectors will be more than $6.4 trillion over the coming decade; of that, small to medium sized enterprises in developing countries, …

Untitled design (27)

Quick Quotes: Industry Thoughts on Cybersecurity and Collaboration

Kobi Freedman Enterprise

You’ve read a lot from us and our writer is on summer vacation. This is the perfect opportunity to pull out our favorite industry pearls of wisdom and continue in the spirit of sharing. “Much of that trepidation is a direct result of a ‘trust deficit’. The best way to tackle a trust deficit is to build trust,” he said. …

Untitled design (20)

Making Secure and Private Collaboration Between Enterprises Possible

Kobi Freedman Enterprise

On July 15, the FBI announced that they, along with an international coalition of law enforces, had shut down the underground global computer hacking forum known as ‘Darkcode’. This operation is likely to have required collaboration with over 12 countries and could potentially lead to the arrest of over 800 hackers. Information sharing at its finest. In the business sector, …

Untitled design (17)

The Weakest Link in the Supply Chain: Beware of Third Party Hacks

Kobi Freedman Enterprise

There’s a shift happening in the world of cybercrime. This shift is towards using indirect attacks where hackers use compromised data, such as login credentials from individuals or smaller companies within a supply chain, to then access companies higher up the chain and ultimately infiltrate mass numbers of user accounts and their Personally Identifying Information (PII) therein. You can describe …

bird cage for blog

Buying A Feed Is Not ‘Information Sharing’

Kobi Freedman Enterprise

The rapid evolution of threat intelligence solutions over the last few years along with the increasing awareness of advanced threats to organizations has created muddle, confusion  and false assumptions about what problems are solved through which product offering. For example,  many CISOs falsely assume that purchasing an intelligence feed will also provide the necessary solution for for their information sharing needs. …

847x480-cyber threat defense

Facebook’s ThreatExchange: Who Owns Your Data?

Guy Wertheim Enterprise

In February Facebook announced a wonderful initiative: ThreatExchange. The new platform will assist security researchers to share their findings. In particular, it enables them to share their own security information and insights with peers, collaborate, and gain more information. However, the reward Vs. risk element of the platform should be carefully weighed up when designing an overall enterprise sharing policy. …