Services

Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

What is Managed Intelligence?

Technical Blogs

1 min read

How to Use Breach Credentials to Support Intelligence Collection and Attribution

By Jared Hudson, Zeshan Aziz, and Dev Badlu on Aug 19, 2020 1:38:57 PM

While some organizations may view third party breach usernames and passwords as important indicators to prevent unauthorized access to their own networks, larger organizations are using two factor authentication for securing their perimeters by locking down internet-facing services where the mere availability of these credentials are less actionable. 

Continue Reading
3 min read

Establishing a System to Collect, Enrich, and Analyze Data to Generate Actionable Intelligence

By Adam Gayde on Jul 15, 2020 11:53:58 AM

In the era of data-driven decision making, the value of threat intelligence and interest in establishing or expanding threat intelligence programs is growing rapidly. However, the growing availability and access to data is outpacing the ability of these threat intelligence programs to leverage and operationalize it.

According to a recent Gartner report, “the value of (threat intelligence) services is sometimes constrained by the customer’s ability to afford, absorb, contextualize, and, especially, use the information provided by the services.” 1

Continue Reading

Featured