Top IT Security Bloggers

Graham Cluley
  • 12 Common Threat Intelligence Use Cases

    Graham Cluley
    Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
    Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.
    Are you using threat intelligence to its full potential?
    The term “threat intelligence” is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner “Market Guide for Security Threat Intelligence Products and Services” explains the different use cases and how to best leverage threat intelligence in your organization.
    You will learn how to:

    Identify 12 common threat intelligence use cases.
    Align these use cases to your specific requirements.
    Implement strategies for getting value from threat intelligence.
    Evaluate vendors based on your business needs.

    Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.

    If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
  • Online poker site bombarded by DDoS attacks, pauses tournaments

    Graham Cluley
    One of the world’s oldest online poker websites has been forced to pause its online tournaments after suffering a series of distributed denial-of-service attacks.
    Read more in my article on the Hot for Security blog.
  • Hacker who almost sprung a prisoner out of jail is himself imprisoned for seven years

    Graham Cluley
    IT staff were tricked into visiting a webpage which installed malware onto their computers, ultimately giving a hacker complete control of prison records.
  • Flawed routers with hardcoded passwords were manufactured by firm that posed ‘national security risk’ to UK

    Graham Cluley
    Researchers discovered it was possible to compromise Hyperoptic’s ZTE-manufactured routers simply by tricking an intended victim into clicking on a malicious link.
    Read more in my article on the Hot for Security blog.
  • 12 Common Threat Intelligence Use Cases

    Graham Cluley
    Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
    Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.
    Are you using threat intelligence to its full potential?
    The term “threat intelligence” is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner “Market Guide for Security Threat Intelligence Products and Services” explains the different use cases and how to best leverage threat intelligence in your organization.
    You will learn how to:

    Identify 12 common threat intelligence use cases.
    Align these use cases to your specific requirements.
    Implement strategies for getting value from threat intelligence.
    Evaluate vendors based on your business needs.

    Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.

    If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
  • The NSA wants its algorithms to be a global IoT standard. But they’re simply not trusted

    Graham Cluley
    Part of the concern is that the Simon and Speck algorithms might contain encryption backdoors that would be abused by US authorities.
    Read more in my article on the Bitdefender Box blog.
  • Reports of tech support scams rocket, as fraudsters make a pretty penny

    Graham Cluley
    A genuine Microsoft error message or security warning will never include a phone number. So don’t call it!
    Read more in my article on the Hot for Security blog.
  • Researchers reveal how hotel key cards can be hacked – what you need to know

    Graham Cluley
    Security researchers at F-Secure have discovered a flaw that could allow millions of hotel rooms around the world to be accessed by unauthorised parties, without leaving a trace.
    Read more in my article on the Tripwire State of Security blog.
  • Smashing Security #075: Quitting Facebook

    Graham Cluley
    Should you quit Facebook? How do you delete your Facebook account? What do you need to consider before leaving Facebook for good? And what’s the easiest way to successfully go cold turkey on Facebook?
    Find out in this special splinter episode of the “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest Maria Varmazis.
  • Website down! DDoS-for-hire site Webstresser shut by crime agencies

    Graham Cluley
    International law enforcement agencies have forced offline a website believed to be the world’s biggest marketplace for hiring distributed denial-of-service (DDoS) attacks.
    Read more in my article on the Hot for Security blog.

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release