Blog_Header.jpg

IntSights' Blog

Nathan Teplow

Nathan Teplow
Nathan is a Senior Product Marketing Manager at IntSights, responsible for the company's positioning, messaging and content strategy. He has worked in IT and cybersecurity marketing for over 5 years, holding a number of different roles across product marketing, marketing programs and content marketing. In his free time, he enjoys staying active, being outdoors and following any and all Boston sports teams.
Find me on:

Recent Posts

There’s a lot of talk these days about Cyber Threat Intelligence (CTI) because it gives organizations an opportunity to be proactive, rather than reactive, in their cyber defense. There are many interesting use cases for CTI, but it takes an investment in tools and people to be used effectively....

Tomorrow marks Halloween here in the U.S, where children (and adults too) dress up in costumes and go door-to-door collecting candy around their neighborhood. While many people will be disguising themselves tomorrow night, there’s a place online where people disguise themselves every day...the...

Over the past few years, online shopping has grown significantly, making it extremely easy to order anything you like, whenever you like, to wherever you like. Technology has made it more convenient for us to purchase goods, and threat actors are no exception. This growth in online shopping,...

We've reached the final strategy in our series, 6 Ways to Upgrade your Threat Intelligence Program. This final strategy focuses on your digital attack surface, which extends to any vendor or partner that you share data with. If they get breached, there’s a chance your data can be exposed, so it...

It's another week, which means another tip for upgrading your threat intelligence program: Take Down Fraud Campaigns & Cyber Scams. Cyber fraud is a booming business for hackers, generating millions of dollars worth of fraudulent purchases each year. Even if a company is not responsible for...

In part 4 of our blog series, we focus on: Expanding Protection to Your Customers and Your Brand. As corporate cyber defenses have become stronger and more efficient, threat actors have turned to what's typically the weakest link, the customer. Cybercriminals often impersonate popular brands...

To continue our blog series on how to upgrade your threat intelligence program, we turn to part 3: leverage automation and integrations. The longer a threat goes unmitigated, the bigger risk it poses. That’s why automation is key to an effective threat intelligence program. Using integrations...

We continue our blog series on how to upgrade your threat intelligence program with part 2: focus on action, not searching. There is lots of threat data and threat intelligence that you can consume. You might think that it's better to have access to as much information as possible, but this...

Threat hunters and incident responders rely on intelligence to see, identify and respond to attacks. There are many different forms of intelligence, like Open-Source Intelligence (OSINT), Signals Intelligence (SIGINT), and Social Media Intelligence (SOCMINT). However, the one constant behind all...

Cyber Threat Intelligence (CTI) is a hot buzzword in the world of cybersecurity. Many enterprise organizations are beginning to build out a dedicated threat intelligence program, focused on proactively identifying and hunting cyber threats before they are carried out as an attack. This has...

The 2018 NFL season kicks off this week, meaning football fans and fantasy team owners are gearing up for what’s sure to be an exciting season. There are lots of expressions and sayings in football, like there’s no “i” in “Team” or clear eyes, full hearts, can’t lose. But there’s one saying that...

As the threat landscape evolves, so too must a company’s threat intelligence program. Cyber attacks have become more targeted, complex and frequent, and as a result, threat intelligence teams have become overwhelmed with the amount of data and alerts that are associated with “intelligence”. To...

Phishing is a popular social engineering tactic used by hackers, typically intended to dupe users into clicking on a link, opening a malicious file and/or giving away some sort of personal info. Sometimes the phishing attempt is the primary goal of the attack, like tricking a user to download...

In our modern age of digital connections and ubiquitous Internet access, both organizations and individuals face a “double-edged sword” when using web-based technologies. As we’ve increased our usage of the World Wide Web, our digital footprints have grown exponentially, and as a result, so has...