by Ed Amoroso, CEO and Founder, TAG Cyber Compromise intelligence offers cyber defenders a means to utilize cyber threat information about malicious actor behavior to discover and contextualize compromises. Ed Amoroso describes what it is, how it works and to implement this compromise intelligence with Prevailion. Understanding Compromise Intelligence
Prevailion Technical White Paper on preventing breaches by leveraging active compromises and associated 3rd party risk vs. solutions like Attack Surface Management that focus on Focusing on Compromise Intelligence vs Vulnerability Intelligence risk.
by Will Gragido, Chief Strategy Officer – Prevailion, Inc. Intelligence analysis is dependent upon many things not the least of which are collections and access to data (e.g., pcaps, logs etc.) sourced from within the network. Prevailion affords its customers the ability to view intelligence related to real state of compromise outside the network’s perimeter. […]
By Sanjay Raja, VP of Marketing Prevailion, Inc. Previous Generation Intelligence and Adversary Hunting A subset of Threat Intelligence or even Threat Hunting using Intelligence called Adversary Intelligence or Adversary Hunting is nothing new. Traditional threat intelligence has focused on Identifying and documenting newly discovered threats Identifying Threat Actor Tactics, Techniques, Procedures (TTPs) Delivering insights […]