Threat Intelligence logo

Blog

With Threat Intelligence’s blog you stay up to date with the latest cyber security tips and news

Featured Post

Two computer monitors are sitting on a desk next to each other.
By Threat Intelligence January 16, 2025
SIEM software uses advanced detection, analytics, and response capabilities to provide insights into everything going on within an IT environment.
Two computer monitors are sitting on a desk next to each other.
By Threat Intelligence January 16, 2025
SIEM software uses advanced detection, analytics, and response capabilities to provide insights into everything going on within an IT environment.

Cybersecurity Threats & Trends


A person with a mask on their face is sitting in front of a computer.
By Threat Intelligence January 9, 2025
In this blog post, we're going to dive into threat hunting and how it can help your organization.
A large group of people are walking down escalators in a mall.
By Threat Intelligence December 6, 2024
Retail's shift to e-commerce brings new cybersecurity risks. Learn how retailers can protect customer data in the digital age.
A white wifi icon in a circle on a black and red background.
By Threat Intelligence November 7, 2024
In this blog post, we will explore the ins and outs of wireless penetration testing – what it is, the steps involved, the tools used, and the invaluable benefits it brings to the table.
A person is holding a tablet with a graph on it.
By Threat Intelligence October 3, 2024
Discover the essentials of threat and risk assessment (TRA), its benefits, and how to effectively conduct assessments for enhanced security.

Enterprise Security


The words siem vs soar are written in red on a black background
By Threat Intelligence January 3, 2025
Compare SIEM and SOAR to discover their unique strengths and how they complement each other. Learn why your business might need both for robust security. Read more!
A robotic hand is pointing at something in front of a clock
By Threat Intelligence December 22, 2024
Learn how AI-powered XDR enhances threat detection, response, and analyst efficiency for better cyber defense.
A red cube is glowing in the dark on a black background.
By Threat Intelligence November 14, 2024
Explore the importance of critical infrastructure protection and how cyber threats like ransomware, data breaches, and denial-of-service attacks jeopardize essential services.
A laptop computer with a lot of numbers on the screen.
By Anupama Mukherjee October 17, 2024
Learn how to effectively secure your OT and SCADA systems with this in-depth guide to penetration testing, covering key steps, best practices, and essential insights for protecting critical infrastructure.

Regulatory and Compliance Updates


Iso 27001 : how to prep like a pro
By Anupama Mukherjee May 31, 2024
Discover the significance of ISO 27001 in cybersecurity and gain insights from our Technical GRC Specialist in this comprehensive guide.
NIST Cybersecurity Framework
By Anupama Mukherjee May 8, 2024
In this blog post, we'll provide an overview of the NIST Cybersecurity Framework and explain how you can use it to improve your organization's cybersecurity posture.
By Threat Intelligence April 19, 2024
Unlock the secrets to navigating the intricacies of the Defence Industry Security Program (DISP) with confidence. Our expert team offers invaluable insights and tailored support to help you meet DISP's rigorous security assessment requirements.
By Threat Intelligence October 25, 2023
In this blog post, we'll explore the legal ramifications of data breaches and provide best practices to help safeguard your business.

Incident Response and Recovery


A man is looking at a computer screen with a lot of code on it.
By Threat Intelligence September 27, 2024
In this post, we're breaking down everything you need to know about automated incident response.
business con
By Threat Intelligence September 13, 2024
Learn how a Business Continuity Plan (BCP) can protect your organization from disruptions and ensure long-term success.
A red and black icon on a black background.
By Threat Intelligence September 21, 2023
Get a concise overview of data breach reporting in Australia. Explore its importance, legal essentials, and proactive prevention measures.
A man in a hood is sitting at a desk using a laptop computer.
By Anupama Mukherjee July 18, 2023
This blog post talks about the lesser-discussed consequences of data breaches that can have a lasting impact on organizations.

Practical Security Tips


AV vs EDR vs XDR
By Anupama Mukherjee August 16, 2024
Compare antivirus, EDR, and XDR solutions. Learn the differences and choose the best fit for your cybersecurity needs.
A red triangle with an exclamation point inside of it on a black background.
By Threat Intelligence June 28, 2024
Discover critical vulnerabilities in MOVEit Transfer and Gateway. Learn about the risks and immediate actions needed to protect your data. Update now to stay secure.
A red triangle is floating in the air on a black background.
By Threat Intelligence April 4, 2024
Stay informed about the latest security threat - CVE-2024-3094 represents a supply chain compromise discovered within the latest versions of xz Utils. Read our blog post now for essential insights and mitigation strategies.
A red and yellow warning sign is displayed on a black background.
By Threat Intelligence February 13, 2024
Our team performed an investigation on the latest Fortinet vulnerability and developed custom IOCs to detect the exploitation of this vulnerability. Read on to understand the details of this critical security concern and the necessary steps to protect your systems.

Experts POV


A computer generated image of a brain on a blue background.
By David Gilmore December 16, 2024
Explore the risks & implications of jailbreaking AI chatbots. Learn how circumventing security measures can lead to reputational damage & unforeseen consequences.
A man is sitting at a desk in front of a computer.
By Threat Intelligence November 29, 2024
Discover the truth behind 5 common IT security myths and learn how to protect your business from hidden vulnerabilities.
A pixel art illustration of a hacker breaking into a confidential folder
By Threat Intelligence November 22, 2024
Discover the patterns behind major corporate breaches and learn how to strengthen your business resilience.
Man sitting on a couch with his laptop
By Threat Intelligence October 30, 2024
Discover the most common security oversights we see in enterprise environments—from outdated practices to overlooked vulnerabilities—and learn how to strengthen your security posture to face today’s evolving threats.

Explore Other Resources

Explore our comprehensive product guides and free cybersecurity resources to stay informed, secure, and ahead in the digital world.

A laptop computer with a bunch of screens on it.

Ready to Get Started?

Is your organization looking for a complete cyber security solution? With our products and services, your team can take a propositive security posture. Let’s chat.

Share by: