Blog_Header.jpg

IntSights' Blog

Threat hunters and incident responders rely on intelligence to see, identify and respond to attacks. There are many different forms of intelligence, like Open-Source Intelligence (OSINT), Signals Intelligence (SIGINT), and Social Media Intelligence (SOCMINT). However, the one constant behind all...

Passwords are the cornerstone of modern information security. It’s inconceivable to think of information security without passwords, yet they are an extremely vulnerable security mechanism. Every time a new “mega breach” occurs, the details of millions of users are exposed and sold online. These...

Threat Intelligence is built on three pillars, which, when integrated, allow identification and remediation of security threats.  

While there are many cyber threat intelligence services available, both human and machine based, they tend to be flawed. Due to a reoccurring lack of context, the data is rendered less relevant, thus leaving the customers with limited actionable intelligence.