IntSights' Blog

With the cybersecurity threat landscape growing and evolving rapidly, many enterprises and other large organizations are seeking more effective ways to protect themselves and their employees from these threats. Threat intelligence platforms can help you take a more proactive approach to managing...

As cyber attacks continue to grow in size, scope and complexity, organizations across the world are forced to find new ways to protect themselves and mitigate these cyber threats. This has given rise to many Cyber Threat Intelligence (CTI) solutions and services, which all serve the purpose of...

Threat information sharing requires dedicated protocols in order to accurately and quickly disseminate the information. The industry recognised this, and has developed three formats, each with a specific function:

Organizations face asymmetric and unprecedented risks from insiders — employees and contractors who have valid access to enterprise networks. Insider risk is on the rise in part due to the growing influence of the dark web, a portion of the internet that enables anonymity. The dark web is being...

The EU General Data Protection Regulation (GDPR) will be in full effect by 2018 (see the full document here). The GPDR will replace the Data Protection Directive, that dates back to 1995. The regulation focuses on the processing and storing of personal data, and mandates organisations to act...

It seems that cyber-espionage is on everyone’s mind these days. Fierce allegations are being made by US officials, claiming that Russian hackers interfered with the US election process. President Obama’s last act in office was to issue sanctions against alleged Russian hacking. But is this...

We are proud to announce the release of a collaborative research project that we’ve conducted with the cybersecurity company Imperva.

Passwords are the cornerstone of modern information security. It’s inconceivable to think of information security without passwords, yet they are an extremely vulnerable security mechanism. Every time a new “mega breach” occurs, the details of millions of users are exposed and sold online. These...

Threat Intelligence is built on three pillars, which, when integrated, allow identification and remediation of security threats.  

While there are many cyber threat intelligence services available, both human and machine based, they tend to be flawed. Due to a reoccurring lack of context, the data is rendered less relevant, thus leaving the customers with limited actionable intelligence.

Ransowmare has been identified by the security community as a top threat of the cyber ecosystem in 2016. The proliferation of ransomware attacks in 2015 and 2016 resulted in a rapid evolution of new Ransomware types, yielding higher returns and fueling this epidemic.

You can find them on all social media platforms: LinkedIn, Facebook, even Twitter and Instagram. Corporate social media accounts which, for one reason or another, don’t look quite right. Many of these suspicious-looking “Official” social media accounts claiming to represent companies or...

The laws of economy state that if there’s a need for a product or service, there will be someone willing to offer it. If, however, one is in the market for something slightly bizarre or corrupt they need look no further than the Darknet marketplaces. Not surprisingly, the various goods and...