Stories by Anthony Stitt
Australia’s focus on critical infrastructure risk management
Australia and many other countries around the world continue to bolster cybersecurity initiatives with the goal of increased trust and verification in mind.
The increasing importance of cyber threat intelligence
Globally, the cyber threat level to organisations remains high, and the current situation only serves to highlight this further.
Five pointers for choosing a Threat Intelligence Platform
Companies are investing in Threat Intelligence Platforms (TIPs) to enhance cybersecurity and manage the deluge of data from disparate sources.
The state of the SOC: skills shortages, automation and gaining context remain a challenge for SOCs
The security operations centre (SOC) has been on the front line facing the pandemic-induced escalation of cybersecurity threats in the past eighteen months.
Maximising your investments through security automation
Organizations have accelerated their plans for security automation due to the COVID-19 pandemic, with 80% now having partial automation, a new report finds.
The threat model as a compass
Just like a compass, regularly reviewing the threat model keeps the CTI teams IR’s pointed in the right direction over time.
Anatomy of a supply chain attack: how to accelerate incident response and threat hunting
Supply chain attacks show no sign of slowing down. But the right combination of platforms can help organisations get ahead of the threat.
What makes a security analyst successful? Investigative thinking
Empowering humans to engage in critical thinking is vital to efficient detection and response, writes ThreatQuotient APJC regional director Anthony Stitt.
Leveraging a new MSSP/MDR SOC contract to build an intelligence practice
Few organisations have matured their security operations (SecOps) to the point where they have integrated a complete CTI practice.
Companies must be on the same page to achieve strategic & tactical CTI management
An effective CTI program requires the alignment of people, processes and technology, writes ThreatQuotient APJC regional director Anthony Stitt.
Proactively mitigate cyber risk with MISP and TheHive
When an attack happens, security teams should be ready with information about who is attacking and the steps being taken to mitigate damage.
Defence engineering and threat intel — no stone left unturned
Understanding the limitations of defences requires examining how blocking and detection systems leverage cyber threat intelligence.
Pandemic sees organisations of all sizes and industries invest in CTI
The 2021 SANS Cyber Threat Intelligence survey reveals the growing importance of CTI as cyber-breaches and COVID-19-related attacks increase.
MITRE ATT&CK: A holistic cyber approach
The MITRE ATT-CK framework provides a threat-informed approach to detecting and protecting against malicious attacks.
Threat intelligence platforms underpin security efficiency and effectiveness
Cyber-threat fusion centres transform siloed security, enhancing cross-department intel sharing & decision-making.
Why best-practice threat data management provides confident automation
Understanding an organization's threat landscape requires the right data sources and prioritization for actionable intelligence.
Organisations already have the threat intelligence they need, finding it and actioning it is another question
Many organisations struggle to create an effective threat model, but internal threat intelligence data can provide valuable insights.
Why answering the question of orchestration vs automation will improve your security effectiveness
Aussie cyber spend soars; SOAR tech faces tough uptake despite efficiency promise. Skills shortage looms.
Successful threat hunting requires curation & collaboration
Many organizations already have the technology required for threat hunting, with SIEMs and threat intelligence a starting point.
The five key steps to security automation
Volvo's CEO skips level 3 self-driving cars, deeming them unsafe. What lesson can we learn about automation in security operations?.