Featured Blog Post

How to Fix Security-Alert Overload


The technology exists to remedy alert fatigue. So why aren’t companies using it?

READ MORE
Security

The Week in Review: Cybersecurity News


Recent threats to real estate companies, HBO’s new hack, the secret cyber attack on the FCC, explaining machine learning’s role in big-data security analytics, and more

Read More

Real Estate Cybersecurity

Real Estate Companies Are Sitting Ducks


With countless attack vectors, real estate (a goldmine of financial transactions and data) is not prepared for what’s to come

Read More

Hollywood Entertainment Hacks

The Week in Review: Cybersecurity News


Hackers eye entertainment, proof that phishing is stoppable, breach disrupts mobile service for 7 million, DNA infected with malware

Read More

phishing attacks

The Surprising, Not-So-Secret Habits of Phishers


Good news: A new report reiterates that phishing attacks are far less sophisticated (and far more stoppable) than they seem

Read More

HBO hack

Spoiler Alert: Hackers Break Into Entertainment


The cyber attack on HBO is a reminder that hackers are gaining ground in Hollywood. Here’s how networks and studios can stop them.

Read More

Def Con hacker

The Week in Review: Cybersecurity News


WannaCry hero arrested leaving Def Con, inside HBO’s hack, new medical-device legislation, how to help Ukraine

Read More

Flash CaaS malware healthcare

The Week in Review: Cybersecurity News


How hacks are impacting healthcare companies, the rise of CaaS do-it-yourself malware kits, developers rejoice as Flash gets phased out

Read More

dark web crimeware

Cyberattacks Spike, Thanks to Crimeware Services


Dark-web opportunists are creating do-it-yourself hacking kits. This is what your enterprise can do to thwart them.

Read More

The IoT and Healthcare’s State of Emergency


Organizations have adopted IoT technologies to cut costs. Now it’s time to consider the cybersecurity that can protect them as business investments, too.

Read More

cybersecurity news

The Week in Review: Cybersecurity News


The financial impact of malware, Verizon’s latest breach, new findings from McAfee’s threat report

Read More

virus malware

5 Startling Facts From McAfee’s Threat Report


The study focuses on the omnipotence of malware attacks and how creative they are getting

Read More

Black Hat USA 2017 Las Vegas

What’s New at the Black Hat Conference?


Find out at booth #774, where Interset will unveil new features aimed at remedying alert fatigue, security blindspots, and complicated architecture.

Read More

USB memory stick flash drive

Is Your Security Team Being Set Up for Success?


Their endpoint-security software may be doomed to falter on its own. But it will thrive in a centralized environment.

Read More

Cyber Insurance Global Threats

The Week in Review: Cybersecurity News


Impact of global attacks on cyber insurers, establishing a culture of security in the workplace, hackers eyeing power plants

Read More

Psychology of Cybersecurity

The Psychology of Enterprise Security


Change management is risk management — cultivating a culture of security

Read More

Star Gazing False Positives

It’s Time to Weed Out Cybersecurity Eye Candy


Buyer beware: Just because a user interface looks futuristic, that doesn’t mean it’s quick and effective

Read More

Petya malware attack

The Week in Review: Cybersecurity News


The Petya-attack aftermath, do-it-yourself cyber-crime kits, security’s increasing impact on company value

Read More

Malware Advertising Target

Advertising Agencies: Malware’s Perfect Target


If advertising companies are so aggressive about winning lucrative business, why are they so passive about protecting it?

Read More

cybersecurity of M&A

Security Now Determines Company Value


The Yahoo-Verizon deal hit a nerve in the M&A process, where a company’s cybersecurity posture has become a sensitive negotiation issue

Read More

security tech solutions

The Week in Review: Cybersecurity News


The solution to security-alert fatigue. Senators get vocal about grid security. Data-breach costs up in the U.S.

Read More

false positive alert

How to Fix Security-Alert Overload


The technology exists to remedy alert fatigue. So why aren’t companies using it?

Read More

risk security analytics technology

How to Find Proactive, Risk-Based Security


A cybersecurity executive order emphasizes the dire need to protect critical infrastructure. Our CTO details the type of security analytics that will achieve that.

Read More

China Investment U.S. Technology Startups

China’s Sneak Attack


Steadily increasing Asian investment in American start-ups (especially those pioneering AI) is spooking the U.S. government

Read More

cyberthreats networks USA

The Week in Review: Cybersecurity News


Malware is everywhere. Threats against energy grow very serious. And the Girl Scouts get into cybersecurity.

Read More

Black out

All About Industroyer, Energy’s Scariest Malware


A new report warns utility companies to prepare themselves, as grid viruses get exceptionally sophisticated

Read More

CPA Risk Management Cyberthreats

Your CPA Can Make a Great Risk-Manager


Cybersecurity takes a village. Here’s why that village now includes your accountant.

Read More

Week in News Healthcare Comey NSA

The Week in Review: Cybersecurity News


A U.S. task force’s cyberplan to save healthcare, ex-FBI director Comey comes clean on the election hacks, new details about the NSA leaker, and more

Read More

Gartner Security and Risk Summit

See the Smartest Analytics at the Gartner Summit


Talk is cheap! Meet us at booth 222 for a look at our security platform in action.

Read More

Healthcare Cybersecurity HHS

Is Healthcare in Crisis?


The Department of Health and Human Services seems to think so. It just published a report suggesting six ways the medical industry can fix its cybersecurity failings.

Read More

high-tech manufacturing aerospace factory

The High-Tech Vision Quest


Manufacturers face IoT security blindspots, from R&D down to the factory floor

Read More

Vladimir Putin Oliver Stone

The Best Cybersecurity Articles This Week


Vladimir Putin on Edward Snowden, China’s cryptic new security law, and other can’t-miss stories

Read More

Half-Year Report: How Bad Have Data Breaches Gotten?


Business is the most compromised industry, while theft in finance is surging

Read More

Hidden Threats Security

The Best Cybersecurity Articles This Week


How to take on hackers, ransomware, and other unforeseen threats

Read More

Utility Ransomware

Lessons Learned From a Ransomware Attack


After a malware breach, a utility company paid the ransom. That was just the start of its troubles…

Read More

Cybersecurity Jobs

Does Your Company Really Need an MSSP?


What enterprises may be missing when they outsource their cybersecurity

Read More

WannaCry Attack

The Best Cybersecurity Articles This Week


The global WannaCry ransomware attack inspires discussions on how to build a better security posture

Read More

cybersecurity blind spot contractors

Cybersecurity’s Nagging Blind Spot


Why companies aren’t able to successfully monitor contractors and third-party vendors

Read More

bitcoin ransomware

Ransomware Goes on a Global Harm Offensive


The aptly named WannaCry rattles security teams across the world, hitting governments and private enterprises alike

Read More

Hamburger Hackers

The Best Cybersecurity Articles This Week


Hackers model ransomware after hamburgers, and Trump wants cyber defense in the cloud

Read More

AML in the Age of Cybersecurity


Compliance in finance is getting complicated. But there is an upside.

Read More

Manufacturing Industry Hacks

Manufacturing’s Secrets and Lies


Increasing numbers of hackers are banking on employee access to valuable information

Read More

The Best Cybersecurity Articles This Week


Old threats, and how they come back to haunt us

Read More

Financial Planner Advisor Client

It’s Time to Talk to Your Client About Cybersecurity


Why financial advisors are working customers into their security strategies

Read More

Cyber security Inside threats finance

Finance Execs Are Too Confident in Their Security


Inside threats continue to plague companies. And they’re really hard to spot.

Read More

North Korea Is on a Global Bank-Robbery Spree


As tensions flare between the U.S. and North Korea, the latter has been laser-focused on pulling off lucrative cyber heists

Read More

Business Security

The Best Cybersecurity Articles This Week


How formidable is your business’ security posture?

Read More

Interset Accelerates Investigations With New Innovation


It ingests third-party data feeds to drive analytic models, create custom workflows/alerts, and enhance incident context

Read More

Financial Industry Big Data

The Standoff Between Banks and Money-Management Sites


Ultimately, it will boil down to who wins at cybersecurity

Read More

Water Utility Cyber Ninja

The Best Cybersecurity Articles This Week


The government gets tough on WikiLeaks, as enterprises get creative with ‘bug bounty-hunters’ and ‘cyber ninjas.’

Read More

Bug Bounty Hunter

Should Your Company Hire Bug Bounty-Hunters?


From Apple to the Department of Defense, organizations are turning to “good” hackers to find vulnerabilities. Here are some things to consider before you do, too.

Read More

business of IT security

How Business Drives Security (and Vice Versa)


A look at the Enterprise Strategy Group’s annual “IT Spending Intentions Survey,” and what companies can learn from it

Read More

Interset platform cybersecurity analytics

Interset Has Expanded Its Compromised-Account Detection


We added more probabilistic models to bolster unsupervised machine learning

Read More

The Best Cybersecurity Articles This Week


Finance’s bad week. Cyber-insurance advice. And a new threat frontier: space.

Read More

Cybersecurity insurance risk management

So You Have Cyber Insurance—Now What?


By surmounting policy limitations and accounting for unquantifiable damage, enterprises can improve risk management

Read More

Wells Fargo bank scandal

Wells Fargo Fallout Impacts Board of Directors


The company announced it will recover $75 million from corrupt execs. But board members could still face federal disciplinary actions.

Read More

bridge business of security

The Best Cybersecurity Articles This Week


The best ways to bridge the divide between business and security needs

Read More

Board of Directors cybersecurity

Why Board Members Are Suddenly Interested in Cybersecurity


Executives finally see that a proactive solution can transform business intelligence. Now it’s your job to demystify it for them.

Read More

McAfee Security Company

An Update on the Interset x McAfee Partnership


As McAfee spins off from Intel into its own company, our collaboration grows even stronger

Read More

Washington DC insider threats

The U.S. Government’s War on Insider Threats


Agencies will reportedly invest $1 billion this year on cybersecurity. But what’s the strategy behind their spending?

Read More

Threat Visibility

Webinar: How to Improve Threat Visibility


Catch our discussion-demo that details how security analytics transformed a utility company’s blindspots into actionable intelligence

Read More

Cyber Security Hackers

The Best Cybersecurity Articles This Week


Getting into the heads of cyber criminals and the experts determined to stop them

Read More

Electricity Company Compliance

The Crusade to Cyber-Save Energy


Concerns over cyberattacks have triggered a surge of new grid regulations. This is how utility companies can get compliant.

Read More

cyber threat crowd

Cybersecurity: Lessons From the Field


The questions any company should ask when investing in an analytics solution

Read More

The Best Cybersecurity Articles This Week


Satellite scientists, shady bankers, and nation states—the spies among us

Read More

Stock Market Investments

Three Ways Financial Companies Can Sharpen Their Security


The key is to start with a business strategy, then find a security solution that supports it

Read More

Kremlin Russia

Anatomy of a Data Breach


A Federal investigation into Yahoo’s 2014 breach exposes a Russian government-hacker alliance

Read More

Cyber Crime Business

The Best Cybersecurity Articles This Week


The Yahoo breach has triggered a threat-landscape assessment across the technology, finance, life-science, and fuel/energy industries

Read More

Oil-Companies-Cybersecurity

The Fuel-and-Energy Security Gridlock


Criminally ill-prepared for cyber attacks, two of the most hacked industries can still fight back. But they’re running out of time.

Read More

Global Enterprise Security

Infographic: Security’s New World Order


An enterprise view of cyber threats around the globe, in across several industries

Read More

Data Breach Cybersecurity Intelligence

The Best Cybersecurity Articles This Week


What we have learned from devastating data breaches

Read More

Company Cybersecurity Data Breaches

Five Cybersecurity Truths Companies Must Accept


The good news: the bad news isn’t so bad

Read More

hospital-hackers-medical devices

Are Hackers Eyeing Medical Devices?


As experts warn of future attacks, hospitals and manufacturers must search for solutions

Read More

Cybersecurity investigation

The Best Cybersecurity Articles This Week


Investigations and regulations are ramping up

Read More

Machine Learning Cybersecurity

Why Machine Learning Matters


Past the hype, there’s a goldmine of potential in how AI-powered cybersecurity will transform business strategy

Read More

United States Cybersecurity

Ello Guv’nor! States Take the Cybersecurity Helm


As partisanship muddles federal efforts, governors are uniting to establish cyberlaw and order in both public and private enterprises

Read More

cybersecurity news

The Best Cybersecurity Articles This Week


Some new challenges and many more solutions, in the world of risk management

Read More

North Korea hackers

Brace Yourself for More North Korean Hacks


A fiscal feud between North Korea and China will likely impact U.S. enterprises

Read More

Internet of Things IoT

The IoT Conundrum


Employees working remotely improves performance. But at what cost?

Read More

Neil deGrasse Tyson cybersecurity RSA

RSA Edition: The Best Cybersecurity Articles This Week


ICYMI: Highlights from the sprawling security conference

Read More

Cybersecurity Headlines

The Best Cybersecurity Articles This Week


The latest developments over the past seven days, from the West Coast to the White House

Read More

Target consumer Breach Credit Card Information

Target: The Breach that Keeps on Taking


Four years after the company’s data breach, Target is still attempting to settle suits

Read More

RSA Conference 2016

Lightspeed Ahead: The Interset 2017 Preview at RSA


Visit us at RSA 2017 for a demo of our award-winning Interset 5, plus an exclusive preview of our new innovations

Read More

Cybersecurity Company Office

The Best Cybersecurity Stories This Week


Five stories that will help you keep up with the rapidly changing state of security

Read More

Cybersecurity job Market

The Solution to the Cybersecurity Job Crisis


Too many open positions—and not enough skilled applicants to fill them. Here’s what your company can do about it.

Read More

Safe Fees Fine Data Breach

How a Data-Breach Fine Can Multiply


With laws still uncertain, attorney generals’ fines have become a crapshoot

Read More

Cybersecurity Business News

Weekend News Round-Up: Business + Cybersecurity


How the playing fields for financial, telecom, and healthcare institutions are rapidly changing

Read More

Goldman Sachs Insider Threat Data Theft

A Game-Changer in Prosecuting Data Thieves


Financial institutions get the insider-threat verdict they’ve been waiting for

Read More

UEBA Platform Intel McAfee Cybersecurity

Intel x Interset: How to Buy a UEBA Platform


Our CTO, Stephan Jou, is interviewed by D.J. Long, head of Intel McAfee’s Security Innovation Alliance

Read More

Identity Theft

2016 Data Breach Report Calls Out CEOs


With a record number of thefts, comes a reality check for the C-suite

Read More

Interset Ends 2016 on a High Note


2016 was a great year for Interset not matter how you slice it! Triple bookings, a doubled customer base, and we delivered an enterprise class security analytics platform.

Read More

Airplane Hackers

Can an Airplane Get Hacked? (Probably.)


Enterprising thieves are forcing us to rethink security. Even in the air.

Read More

yahoo security regulations

How Yahoo’s Breaches Will Shape Security Regulations


Its 2013 attack is the largest ever, and will be a tipping point for legislators

Read More

cybersecurity forecast

Security Analytics Will Get Focused in 2017


These seven product shifts will elevate security in the coming year

Read More

Human Resources Information Technology Cybersecurity

HR and IT Make a Powerful Cybersecurity Team


It’s not just a technical hurdle anymore. It’s a workplace-culture problem, too.

Read More

Webinar: A Head Start on 2017’s Security Challenges


Our in-house experts will show you how Interset 5 was built to address common use cases

Read More

NSA Director to CEOs: Security Is Your Job, Too


The Director of the NSA says it’s time to for execs to be more hands-on when it comes to protecting a company.

Read More

Announcing Interset 5: More Data, More Use Cases


One of the greatest challenges analysts face is finding a security platform that’s fast, data-hungry, and fine-tuned.

Read More

What Exactly Makes Intelligence Actionable?


The term “actionable intelligence” is often bandied about. Why? Because data insight can palpably add to an enterprise’s business value.

Read More

This Week in Cybersecurity


Inside the devastating DDoS attack. The Texas politicians moving cybersecurity legislation. What we’ve learned from Clinton campaign manager John Podesta’s oversights. And more…

Read More

Back by Popular Demand: The Insider-Threat Webinar


Our joint webinar with Leidos (formerly Lockheed Martin) takes place on November 14. Sign up here for free.

Read More

How Do You Solve a Problem Like the Kremlin?


Thus far, Washington hasn’t retaliated in any way, other than sternly accusing Russia of attacks. How and when to respond is tricky.

Read More

Ransomware Is About to Become a $1 Billion Industry


Thieves have finally figured out that there’s more money in companies than customers.

Read More

All the Cybersecurity Headlines You May Have Missed This Week


Inside the continuing reaction to Yahoo’s devastating breach. What can we learn from this hack?

Read More

The Complicated Ethics of Data-Breach Disclosure


What’s more gut-wrenching than discovering your company’s network has been breached? Having to publicly announce that breach.

Read More

The Uptick in Federal Breaches Is Alarming


Between 2005 and 2015, federal-agency breaches skyrocketed from 5,503 to 77,183.

Read More

A Catch-Up on the Week’s Cybersecurity Headlines


The week’s most provocative stories about breaches, business, and the lifestyles of some infamous hackers.

Read More

The Number of Identity Thefts This Year (So Far)


Q4 has arrived. And companies will have to ask themselves how much of their 2017 budgets should be invested in cybersecurity?

Read More

Who’s to Blame for All These Breaches?


Are companies too often blaming nation states for big breaches, instead of assessing their own security oversights?

Read More

The Presidential Nominees Debate Cyber Security


Hillary Clinton and Donald Trump held their first presidential debate last evening. Here’s what they said about cybersecurity.

Read More

The Week’s Most Important Cybersecurity Headlines


This week unearthed two of the biggest hacks ever.

Read More

Inside the Cybersecurity Job Rush


In recent years, a profound uptick in data breaches has created a sprawling need for new enterprise-security roles.

Read More

All the Ways to Get Sued After a Data Breach


There’s a tendency to associate any litigation with disgruntled consumers. But a recent class-action lawsuit reminds us that it can come from within the organization.

Read More

[Webinar] Insider Threats and Inside-Out Protection


Interset joins Leidos (formerly Lockheed Martin) for this one-hour event on October 11 at 2 p.m. EST.

Read More

What Snowden’s Boss Learned From the NSA Breach


Five important takeaways from his speech at the Rock Stars of Cybersecurity event.

Read More

The Endless Financial Ripple Effect of a Data Breach


The beneath-the-surface, often unanticipated, costs turn out to be the most impactful.

Read More

The Cover Story Featuring Our CTO


Stephan Jou lays out the origins of machine learning, how it works, and why it’s so important to security analytics.

Read More

The ‘Insider Threat’ and the ‘Threat Inside’ Are Both Important


Outside attacks have a high success rate by penetrating perimeter defenses and becoming a “threat inside” the network.

Read More

Missed Us at Black Hat? Catch Our CTO’s Webinar…


On August 10, Interset’s CTO will explain how advanced analytics stays one step ahead of even the most sophisticated attack.

Read More

U.S. Government to Rank Security Threats


In light of the DNC hack, the White House has started ranking Federal and private incidents with a centralized threat-level scale.

Read More

Interset Goes Cyber-Hunting at Black Hat 2016


Learn why the U.S. intelligence community is investing in Interset’s platform.

Read More

Data Security Has Become Job Security


The Target hack changed the nature of breaches, when its reverberations shot up the chain of command.

Read More

Why U.S. Intelligence Agencies Are Banking on Interset


In-Q-Tel spent more than a year researching and conducting hands-on analyses of the many User Behavior Analytics products in the market.

Read More