Profile cover photo
Profile photo
LookingGlass Cyber Solutions
19 followers
19 followers
About
LookingGlass Cyber Solutions's posts

Post has attachment
“Threat intelligence is almost like getting an engine rebuilt for your car. There’s different levels, different meanings, different styles based on who you’re dealing with.” Hear more about threat intelligence on the Charles Tendell Show, featuring LookingGlass CTO Allan Thomson https://soundcloud.com/charles-tendell-show/hacking-threat-intelligence-with-tweet-a-t-of-lg-cyber-from-oasisopen-borderlesscyber

Post has attachment
In part 1 of our CSO series, we talked about what drives CISOs and organizations to consider adopting a threat intelligence practice. Join us for part 2, when CTO Allan Thomson discusses how you can start building your threat intelligence program from the ground up https://www.brighttalk.com/webcast/9865/263947

Post has attachment
Join our VP of Intelligence Operations, Eric Olson's New York Information Security Meet Up presentation on how to effectively manage third party risk and the challenges it entails. Tonight, 6-8pm! https://goo.gl/jRPKus

Join LookingGlass Chief Technology Officer, Allan Thomson, at Borderless Cyber for his presentation on how security professionals can reduce risk within their organization and effectively integrate threat intelligence into their security infrastructure. He starts at 9:40am! https://goo.gl/jRPKus

Post has attachment
Healthcare is the sector most frequently targeted by cyber attacks. Healthcare organization have an abundance personal information, making it a likely target for hackers. Read more in second on our latest Threat Intelligence Brief https://goo.gl/ZWkaQQ

Post has attachment
We are excited to announce that LookingGlass won gold for Best IT Products and Services for Enterprise (Large) and bronze for Best Products and Services for Security Software for our ScoutPrime threat intelligence platform in Network Product Guide's 2017 IT World Awards! Read more https://goo.gl/D1un4G

Post has attachment
Read our latest blog discussing how hostile activities in cyberspace extend well beyond the deployment of destructive malware, network exploitation designed to steal information, or various criminal operations. Learn more https://goo.gl/DmpbV5

Post has attachment
Data feeds are a crucial part of discovering vulnerabilities in your systems and monitoring the web for possible ransomware attacks. But that’s only the first step in fighting ransomware. For full story, read more https://goo.gl/ferdYd


Post has attachment
Video game retailer, GameStop, is investigating a possible payment security breach that might have occurred around mid-September. This credit card breach could put customer’s sensitive information at risk. This story and more in our weekly Threat Intelligence Brief https://goo.gl/xixkTK

Post has attachment
Ready for Part 2 of our CSO Series, “Success Factors in Threat Intelligence"? Register now to hear CTO Allan Thomson discuss how to start your organization's threat intelligence program. Live on June 29 @ 12:00pm EDT https://goo.gl/3UEr51
Wait while more posts are being loaded