Featured Blog Post

5 Truths About Cybersecurity That Companies Must Accept


Set yourself up for success: What we've learned about the nature of breaches, and how to strategize threat detection so that it nurtures business objectives.

READ MORE
Hidden Threats Security

The Best Cybersecurity Articles This Week


How to take on hackers, ransomware, and other unforeseen threats

Read More

Utility Ransomware

Lessons Learned From a Ransomware Attack


After a malware breach, a utility company paid the ransom. That was just the start of its troubles…

Read More

Cybersecurity Jobs

Does Your Company Really Need an MSSP?


What enterprises may be missing when they outsource their cybersecurity

Read More

WannaCry Attack

The Best Cybersecurity Articles This Week


The global WannaCry ransomware attack inspires discussions on how to build a better security posture

Read More

cybersecurity blind spot contractors

Cybersecurity’s Nagging Blind Spot


Why companies aren’t able to successfully monitor contractors and third-party vendors

Read More

bitcoin ransomware

Ransomware Goes on a Global Harm Offensive


The aptly named WannaCry rattles security teams across the world, hitting governments and private enterprises alike

Read More

Hamburger Hackers

The Best Cybersecurity Articles This Week


Hackers model ransomware after hamburgers, and Trump wants cyber defense in the cloud

Read More

AML in the Age of Cybersecurity


Compliance in finance is getting complicated. But there is an upside.

Read More

Manufacturing Industry Hacks

Manufacturing’s Secrets and Lies


Increasing numbers of hackers are banking on employee access to valuable information

Read More

The Best Cybersecurity Articles This Week


Old threats, and how they come back to haunt us

Read More

Financial Planner Advisor Client

It’s Time to Talk to Your Client About Cybersecurity


Why financial advisors are working customers into their security strategies

Read More

Cyber security Inside threats finance

Finance Execs Are Too Confident in Their Security


Inside threats continue to plague companies. And they’re really hard to spot.

Read More

North Korea Is on a Global Bank-Robbery Spree


As tensions flare between the U.S. and North Korea, the latter has been laser-focused on pulling off lucrative cyber heists

Read More

Business Security

The Best Cybersecurity Articles This Week


How formidable is your business’ security posture?

Read More

Interset Accelerates Investigations With New Innovation


It ingests third-party data feeds to drive analytic models, create custom workflows/alerts, and enhance incident context

Read More

Financial Industry Big Data

The Standoff Between Banks and Money-Management Sites


Ultimately, it will boil down to who wins at cybersecurity

Read More

Water Utility Cyber Ninja

The Best Cybersecurity Articles This Week


The government gets tough on WikiLeaks, as enterprises get creative with ‘bug bounty-hunters’ and ‘cyber ninjas.’

Read More

Bug Bounty Hunter

Should Your Company Hire Bug Bounty-Hunters?


From Apple to the Department of Defense, organizations are turning to “good” hackers to find vulnerabilities. Here are some things to consider before you do, too.

Read More

business of IT security

How Business Drives Security (and Vice Versa)


A look at the Enterprise Strategy Group’s annual “IT Spending Intentions Survey,” and what companies can learn from it

Read More

Interset platform cybersecurity analytics

Interset Has Expanded Its Compromised-Account Detection


We added more probabilistic models to bolster unsupervised machine learning

Read More

The Best Cybersecurity Articles This Week


Finance’s bad week. Cyber-insurance advice. And a new threat frontier: space.

Read More

Cybersecurity insurance risk management

So You Have Cyber Insurance—Now What?


By surmounting policy limitations and accounting for unquantifiable damage, enterprises can improve risk management

Read More

Wells Fargo bank scandal

Wells Fargo Fallout Impacts Board of Directors


The company announced it will recover $75 million from corrupt execs. But board members could still face federal disciplinary actions.

Read More

bridge business of security

The Best Cybersecurity Articles This Week


The best ways to bridge the divide between business and security needs

Read More

Board of Directors cybersecurity

Why Board Members Are Suddenly Interested in Cybersecurity


Executives finally see that a proactive solution can transform business intelligence. Now it’s your job to demystify it for them.

Read More

McAfee Security Company

An Update on the Interset x McAfee Partnership


As McAfee spins off from Intel into its own company, our collaboration grows even stronger

Read More

Washington DC insider threats

The U.S. Government’s War on Insider Threats


Agencies will reportedly invest $1 billion this year on cybersecurity. But what’s the strategy behind their spending?

Read More

Threat Visibility

Webinar: How to Improve Threat Visibility


Catch our discussion-demo that details how security analytics transformed a utility company’s blindspots into actionable intelligence

Read More

Cyber Security Hackers

The Best Cybersecurity Articles This Week


Getting into the heads of cyber criminals and the experts determined to stop them

Read More

Electricity Company Compliance

The Crusade to Cyber-Save Energy


Concerns over cyberattacks have triggered a surge of new grid regulations. This is how utility companies can get compliant.

Read More

cyber threat crowd

Cybersecurity: Lessons From the Field


The questions any company should ask when investing in an analytics solution

Read More

The Best Cybersecurity Articles This Week


Satellite scientists, shady bankers, and nation states—the spies among us

Read More

Stock Market Investments

Three Ways Financial Companies Can Sharpen Their Security


The key is to start with a business strategy, then find a security solution that supports it

Read More

Kremlin Russia

Anatomy of a Data Breach


A Federal investigation into Yahoo’s 2014 breach exposes a Russian government-hacker alliance

Read More

Cyber Crime Business

The Best Cybersecurity Articles This Week


The Yahoo breach has triggered a threat-landscape assessment across the technology, finance, life-science, and fuel/energy industries

Read More

Oil-Companies-Cybersecurity

The Fuel-and-Energy Security Gridlock


Criminally ill-prepared for cyber attacks, two of the most hacked industries can still fight back. But they’re running out of time.

Read More

Global Enterprise Security

Infographic: Security’s New World Order


An enterprise view of cyber threats around the globe, in across several industries

Read More

Data Breach Cybersecurity Intelligence

The Best Cybersecurity Articles This Week


What we have learned from devastating data breaches

Read More

Company Cybersecurity Data Breaches

Five Cybersecurity Truths Companies Must Accept


The good news: the bad news isn’t so bad

Read More

hospital-hackers-medical devices

Are Hackers Eyeing Medical Devices?


As experts warn of future attacks, hospitals and manufacturers must search for solutions

Read More

Cybersecurity investigation

The Best Cybersecurity Articles This Week


Investigations and regulations are ramping up

Read More

Machine Learning Cybersecurity

Why Machine Learning Matters


Past the hype, there’s a goldmine of potential in how AI-powered cybersecurity will transform business strategy

Read More

United States Cybersecurity

Ello Guv’nor! States Take the Cybersecurity Helm


As partisanship muddles federal efforts, governors are uniting to establish cyberlaw and order in both public and private enterprises

Read More

cybersecurity news

The Best Cybersecurity Articles This Week


Some new challenges and many more solutions, in the world of risk management

Read More

North Korea hackers

Brace Yourself for More North Korean Hacks


A fiscal feud between North Korea and China will likely impact U.S. enterprises

Read More

Internet of Things IoT

The IoT Conundrum


Employees working remotely improves performance. But at what cost?

Read More

Neil deGrasse Tyson cybersecurity RSA

RSA Edition: The Best Cybersecurity Articles This Week


ICYMI: Highlights from the sprawling security conference

Read More

Cybersecurity Headlines

The Best Cybersecurity Articles This Week


The latest developments over the past seven days, from the West Coast to the White House

Read More

Target consumer Breach Credit Card Information

Target: The Breach that Keeps on Taking


Four years after the company’s data breach, Target is still attempting to settle suits

Read More

RSA Conference 2016

Lightspeed Ahead: The Interset 2017 Preview at RSA


Visit us at RSA 2017 for a demo of our award-winning Interset 5, plus an exclusive preview of our new innovations

Read More

Cybersecurity Company Office

The Best Cybersecurity Stories This Week


Five stories that will help you keep up with the rapidly changing state of security

Read More

Cybersecurity job Market

The Solution to the Cybersecurity Job Crisis


Too many open positions—and not enough skilled applicants to fill them. Here’s what your company can do about it.

Read More

Safe Fees Fine Data Breach

How a Data-Breach Fine Can Multiply


With laws still uncertain, attorney generals’ fines have become a crapshoot

Read More

Cybersecurity Business News

Weekend News Round-Up: Business + Cybersecurity


How the playing fields for financial, telecom, and healthcare institutions are rapidly changing

Read More

Goldman Sachs Insider Threat Data Theft

A Game-Changer in Prosecuting Data Thieves


Financial institutions get the insider-threat verdict they’ve been waiting for

Read More

UEBA Platform Intel McAfee Cybersecurity

Intel x Interset: How to Buy a UEBA Platform


Our CTO, Stephan Jou, is interviewed by D.J. Long, head of Intel McAfee’s Security Innovation Alliance

Read More

Identity Theft

2016 Data Breach Report Calls Out CEOs


With a record number of thefts, comes a reality check for the C-suite

Read More

Interset Ends 2016 on a High Note


2016 was a great year for Interset not matter how you slice it! Triple bookings, a doubled customer base, and we delivered an enterprise class security analytics platform.

Read More

Airplane Hackers

Can an Airplane Get Hacked? (Probably.)


Enterprising thieves are forcing us to rethink security. Even in the air.

Read More

yahoo security regulations

How Yahoo’s Breaches Will Shape Security Regulations


Its 2013 attack is the largest ever, and will be a tipping point for legislators

Read More

cybersecurity forecast

Security Analytics Will Get Focused in 2017


These seven product shifts will elevate security in the coming year

Read More

Human Resources Information Technology Cybersecurity

HR and IT Make a Powerful Cybersecurity Team


It’s not just a technical hurdle anymore. It’s a workplace-culture problem, too.

Read More

Webinar: A Head Start on 2017’s Security Challenges


Our in-house experts will show you how Interset 5 was built to address common use cases

Read More

NSA Director to CEOs: Security Is Your Job, Too


The Director of the NSA says it’s time to for execs to be more hands-on when it comes to protecting a company.

Read More

Announcing Interset 5: More Data, More Use Cases


One of the greatest challenges analysts face is finding a security platform that’s fast, data-hungry, and fine-tuned.

Read More

What Exactly Makes Intelligence Actionable?


The term “actionable intelligence” is often bandied about. Why? Because data insight can palpably add to an enterprise’s business value.

Read More

This Week in Cybersecurity


Inside the devastating DDoS attack. The Texas politicians moving cybersecurity legislation. What we’ve learned from Clinton campaign manager John Podesta’s oversights. And more…

Read More

Back by Popular Demand: The Insider-Threat Webinar


Our joint webinar with Leidos (formerly Lockheed Martin) takes place on November 14. Sign up here for free.

Read More

How Do You Solve a Problem Like the Kremlin?


Thus far, Washington hasn’t retaliated in any way, other than sternly accusing Russia of attacks. How and when to respond is tricky.

Read More

Ransomware Is About to Become a $1 Billion Industry


Thieves have finally figured out that there’s more money in companies than customers.

Read More

All the Cybersecurity Headlines You May Have Missed This Week


Inside the continuing reaction to Yahoo’s devastating breach. What can we learn from this hack?

Read More

The Complicated Ethics of Data-Breach Disclosure


What’s more gut-wrenching than discovering your company’s network has been breached? Having to publicly announce that breach.

Read More

The Uptick in Federal Breaches Is Alarming


Between 2005 and 2015, federal-agency breaches skyrocketed from 5,503 to 77,183.

Read More

A Catch-Up on the Week’s Cybersecurity Headlines


The week’s most provocative stories about breaches, business, and the lifestyles of some infamous hackers.

Read More

The Number of Identity Thefts This Year (So Far)


Q4 has arrived. And companies will have to ask themselves how much of their 2017 budgets should be invested in cybersecurity?

Read More

Who’s to Blame for All These Breaches?


Are companies too often blaming nation states for big breaches, instead of assessing their own security oversights?

Read More

The Presidential Nominees Debate Cyber Security


Hillary Clinton and Donald Trump held their first presidential debate last evening. Here’s what they said about cybersecurity.

Read More

The Week’s Most Important Cybersecurity Headlines


This week unearthed two of the biggest hacks ever.

Read More

Inside the Cybersecurity Job Rush


In recent years, a profound uptick in data breaches has created a sprawling need for new enterprise-security roles.

Read More

All the Ways to Get Sued After a Data Breach


There’s a tendency to associate any litigation with disgruntled consumers. But a recent class-action lawsuit reminds us that it can come from within the organization.

Read More

[Webinar] Insider Threats and Inside-Out Protection


Interset joins Leidos (formerly Lockheed Martin) for this one-hour event on October 11 at 2 p.m. EST.

Read More

What Snowden’s Boss Learned From the NSA Breach


Five important takeaways from his speech at the Rock Stars of Cybersecurity event.

Read More

The Endless Financial Ripple Effect of a Data Breach


The beneath-the-surface, often unanticipated, costs turn out to be the most impactful.

Read More

The Cover Story Featuring Our CTO


Stephan Jou lays out the origins of machine learning, how it works, and why it’s so important to security analytics.

Read More

The ‘Insider Threat’ and the ‘Threat Inside’ Are Both Important


Outside attacks have a high success rate by penetrating perimeter defenses and becoming a “threat inside” the network.

Read More

Missed Us at Black Hat? Catch Our CTO’s Webinar…


On August 10, Interset’s CTO will explain how advanced analytics stays one step ahead of even the most sophisticated attack.

Read More

U.S. Government to Rank Security Threats


In light of the DNC hack, the White House has started ranking Federal and private incidents with a centralized threat-level scale.

Read More

Interset Goes Cyber-Hunting at Black Hat 2016


Learn why the U.S. intelligence community is investing in Interset’s platform.

Read More

Data Security Has Become Job Security


The Target hack changed the nature of breaches, when its reverberations shot up the chain of command.

Read More

Why U.S. Intelligence Agencies Are Banking on Interset


In-Q-Tel spent more than a year researching and conducting hands-on analyses of the many User Behavior Analytics products in the market.

Read More