iThreatInfo Follow 108 37
iThreat is a next-generation threat intelligence and analytics firm. iThreat is fully GDPR compliant. Built – Augmented – Delivered – Supported
COVID19 vaccinations are available TODAY, May 14th from 10 a.m. – 1 p.m. at the Heldrich Hotel and Conference Center, 10 Livingston Avenue, New Brunswick.
Visit http://www.middlesexcountynj.gov/vaccine or call the Middlesex County Vaccine Call Center at 732-745-3100. Walk-ins will be accepted!
iThreat and @mikegips published the 2nd issue of our monthly Insider Signal Newsletter covering more economic espionage, a $250M slush fund, data exposure via cloud misconfiguration, and failure to disable accounts for terminated employees. Check it out: .
Insider Signal Plus – 2021.04
In our second issue, we cover more economic espionage, a $250M slush fund, customer and vendor data exposure via …
Did you catch the first issue of our monthly Insider Signal Newsletter? If you are interested in preventing and mitigating insider threats, you’ll want to give it a look at . iThreat and @mikegips shared 14 important insider threat stories!
Insider Signal Plus: 2021.03
Welcome to our first issue! Who's keeping tabs on the anti-fraud expert in the bank? What happens when hospital …
CircleID shared this informative write-up on the DNS Abuse Forum from March 16, reflecting information shared by Jeff Bedser.
Read on to find out more!
The Path to Combatting Domain Abuse
Completely eradicating malware, botnets, phishing, pharming, and spam from the Domain Name System is not possible. Tha…
We are excited to announce the Insider Signal Newsletter. With @mikegips, we’ll share our insights on important insider threat stories and how to prevent, reduce, and respond to similar incidents. Our first issue date will be 3/31. Subscribe now!
Insider Signal Plus Introduction
Insights and analysis about important insider threat stories by iThreat and Mike Gips.
Did you miss it? Here is the recording of iThreat CEO Jeff Bedser speaking at the DNS Abuse Forum: Recent Trends & the Current State.
“Together we will reduce DNS abuse and strengthen trust in both the DNS and the broader Internet.”
Is your #OPSEC program complete?
Do you have wide-reaching monitoring in place for rapid detection of Internet postings of sensitive data about your products, key staff, and facilities?
We can help! Learn more at .
iThreat is changing the approach to predictive and comprehensive threat analytics
We agree with Digital Guardian’s work of categorizing Operational Security into 5 steps:
1) Identify sensitive data.
2) Identify possible threats.
3) Analyze security holes/ vulnerabilities.
4) Appraise risk level.
5) Get countermeasures in place.
#opsec #security #cso
How do dig tools work? How do they benefit me? iThreat’s CleanDNS analysts regularly leverage these lookups to uncover additional infrastructure and evidence of domain abuse to increase the impact of mitigation efforts.
Using Online dig Resources in Domain Investigations
TL;DR Google’s dig tool and digwebinterface.com allow investigators to quickly obtain real-time DNS records for a …
Have you ensured your executives are properly using 2FA for a safer online presence? Are you monitoring for leaks of their PII? Is SMS two-factor authentication as secure as it seems? #2FA #OpSec
Do you use SMS for two-factor authentication? Don't.
Do 2FA the right way to keep hackers at bay.