TAG: cyber security

  • CDM-award-badge

    IKANOW Chosen as the Leader in Enterprise Security Solutions in the 2016 Cyber Defense Magazine InfoSec Awards

    RESTON, VA – February 29, 2016 – IKANOW, the leader in open-source information security analytics, announced today that Cyber Defense Magazine, the industry’s leading electronic information security magazine and media partner of the RSA® Conference 2016, has named IKANOW as the Leader in Enterprise Security Solutions in its annual Cyber Defense Magazine Awards program. The award was announced after many months of review by leading independent information security experts. “We’re thrilled to recognize next-generation innovation in the information security marketplace. That’s why IKANOW has earned this award from Cyber Defense Magazine. …

  • CRN-Magazine-featured-image

    CRN Magazine: IKANOW Announces Preferred Partner Program

    IKANOW announced yesterday its new preferred partner program and to learn more CRN’s Jimmy Sheridan interviewed IKANOW’s Jason Pender and one of our current partners, Kevin Wetzel, CEO of Jigsaw Security Enterprises. In addition to discounts, partners like Jigsaw will receive certification training and marketing tools to help coordinate IKANOW sales efforts with their current offerings. “This will allow us to do more – it’s a win-win situation for us,” said Wetzel. The Cyberthreat Defense Report’s survey of over 1,000 IT security decision makers revealed last week that information security analytics is…

  • kyivoblenergo-customer-letter

    Critical Infrastructure Cybersecurity Risk Realized – Things Have Changed

    The Aurora Generator Test carried out by Idaho National Laboratory in 2007 introduced much of the world to the idea that a cyber hack could cause damage and disrupt electricity distribution. While the test was real, the hack required a successful intrusion first and there were no real-world incidents that actually realized electricity disruption – until last month. By now, most people in the information security community are aware of the hack on at least two Ukrainian power authorities in Ivano-Frankivsk region. As much as high-profile cybersecurity attacks ranging from…

  • ikanow_sept_graphic

    Significant Data Breaches – September 2015

    Apple / iPhone – 225,000 records exposed – malicious outsider Malware was discovered in iPhone’s that have been “jailbroken”. This has affected nearly 225,000 iPhones and the login credentials have been comprised. Read more here. This breach actually was announced late last month but we are including in the September blog post since it wasn’t mentioned in our previous post. Grupo Financiero Banorte – 20,000 records exposed – malicious outsider Grupo Financiero Banorte is a Mexican banking and financial services holding company with headquarters in Monterrey and Mexico City, Mexico…

  • ikanow_july_graphic

    Significant Data Breaches – July 2015

    IKANOW’s major breach index along with a recap of the major data breaches that took place in July 2015 are listed below.   Service System Associates – malicious outsider Service Systems Associates is a customer amenities company that operates eateries and gift shops at cultural attractions across the United States A breach was reported involving point-of-sale malware at gifts shops in several locations. The breach is thought to have originated on March 23, and compromised cards through July 25. Trump Hotel Collection – malicious outsider The Trump Hotel Collection is…

  • Ikanow-Logo-FI2

    Finding Useful Information with your SIEM Tools

    For many companies, the “boy who cried wolf” isn’t a fable. A constant stream of security alerts generated by security information and event management (SIEM) systems can’t distinguish the wolf from the sheepdog, or even the sheep. A study by the Ponemon Institute found that typical companies receive 17,000 malware alerts a week, and fewer than 3,500 are reliable. Only a much smaller fraction, about 700 alerts, is investigated. And those are just malware alerts, not other kinds of threats. Most companies can’t add enough staff to review and respond…

  • source2-1024x636

    InfoSec Analytics: IKANOW’s Major New Release

    Next level infosec analytics We are thrilled to announce today the release of the next version of our Enterprise Edition Information Security Analytics (ISA) platform. This new release will feature several major enhancements to our previous Enterprise Edition.  These enhancements will bolster the ability to actively recalibrate your security posture by applying adaptable analytical techniques and measurement tools that automate analysis and decision-making processes. This new release will include: A simple 3-step source/data ingestion process Enhanced sorting and searching of data 3rd party integrations Ability to collaborate create comprehensive visualizations Let’s…

  • Webinar 07-10-2015

    Webinar Recording: Continuous cybersecurity optimization and prioritized risk reduction. What it takes.

    On July 9th, IKANOW hosted a webinar titled: “Continuous cybersecurity optimization and prioritized risk reduction. What it takes.” The presenters were Jason Pender, IKANOW’s SVP, Field Operations and Victor Buonocore, IKANOW’s Director, Product & Engineering. Jason was first up and provided a brief overview of IKANOW along with the challenges CISOs face today and how the boardroom impacts an organization’s security posture. Victor then discussed how these needs map to IKANOW’s new release. He talked about why IKANOW is updating our existing platform and provided a glimpse into the upcoming...

  • Screen-Shot-2015-05-13-at-11.02.13-AM


    This is part 3 of our blog series, “Are your threat intelligence feeds saving you, or costing you?”. Part 1 covered gathering threat intelligence feeds and part 2 covered selecting the sources themselves. This blog will talk about how to leverage and get value from threat intelligence and threat analytics. Analytics ensures you get the most out of your threat feeds IDC estimates that spending on threat intelligence services will grow to more than $1.4 billion by 2018. But all that spending is useless if the data provided by the threat…

  • newUI_isightdata

    Analytics-Enhanced Threat Intel: Making Feeds Work For You – Part 2

    This is Part 2 of our blog series, “Analytics-Enhanced Threat Intel: Making Feeds Work For You.” Part 1 focused on gathering threat intelligence and making it work for you. This post will cover how to select threat intelligence feeds along with a few of our favorite private threat intel sources. How To Select The Best Threat Intelligence Feeds When evaluating which threat intelligence feed(s) are best for your organization, there are several things you should consider and learn. However, before you evaluate these feeds, you need to understand your organization’s mission, business, and…