iThreat is a next-generation threat intelligence and analytics firm. iThreat is fully GDPR compliant. Built – Augmented – Delivered – Supported
Did you catch the first issue of our monthly Insider Signal Newsletter? If you are interested in preventing and mitigating insider threats, you’ll want to give it a look at . iThreat and @mikegips shared 14 important insider threat stories!
Insider Signal Plus: 2021.03
Welcome to our first issue! Who's keeping tabs on the anti-fraud expert in the bank? What happens when hospital researchers and scientists go rouge? H…
CircleID shared this informative write-up on the DNS Abuse Forum from March 16, reflecting information shared by Jeff Bedser.
Read on to find out more!
The Path to Combatting Domain Abuse
Completely eradicating malware, botnets, phishing, pharming, and spam from the Domain Name System is not possible. That may be an odd statement from s…
We are excited to announce the Insider Signal Newsletter. With @mikegips, we’ll share our insights on important insider threat stories and how to prevent, reduce, and respond to similar incidents. Our first issue date will be 3/31. Subscribe now!
Insider Signal Plus Introduction
Insights and analysis about important insider threat stories by iThreat and Mike Gips.
Did you miss it? Here is the recording of iThreat CEO Jeff Bedser speaking at the DNS Abuse Forum: Recent Trends & the Current State.
“Together we will reduce DNS abuse and strengthen trust in both the DNS and the broader Internet.”
Is your #OPSEC program complete?
Do you have wide-reaching monitoring in place for rapid detection of Internet postings of sensitive data about your products, key staff, and facilities?
We can help! Learn more at .
iThreat is changing the approach to predictive and comprehensive threat analytics
We agree with Digital Guardian’s work of categorizing Operational Security into 5 steps:
1) Identify sensitive data.
2) Identify possible threats.
3) Analyze security holes/ vulnerabilities.
4) Appraise risk level.
5) Get countermeasures in place.
#opsec #security #cso
How do dig tools work? How do they benefit me? iThreat’s CleanDNS analysts regularly leverage these lookups to uncover additional infrastructure and evidence of domain abuse to increase the impact of mitigation efforts.
Using Online dig Resources in Domain Investigations
TL;DR Google’s dig tool and digwebinterface.com allow investigators to quickly obtain real-time DNS records for a domain. Google’s dig too…
Have you ensured your executives are properly using 2FA for a safer online presence? Are you monitoring for leaks of their PII? Is SMS two-factor authentication as secure as it seems? #2FA #OpSec
Do you use SMS for two-factor authentication? Don't.
Do 2FA the right way to keep hackers at bay.
iThreat can help you find PII BEFORE the bad guys do. First off, what is OpSec and how does it affect you?
Why OPSEC Is for Everyone, Not Just for People with Something to Hide
Stuart Peck shares three things you can do right now to dramatically improve you operational security (OPSEC).
If you’re investigating a domain that has been around since at least 2017 and you don’t have access to paid resources, there are still a few ways to find historical WHOIS records.
#WHOIS #GDPR #research #DNS #records
Where to Obtain Historic WHOIS Records for Free
Even in the wake of GDPR, sometimes a historic whois record can hold information vital to your research. While some of the paid resources can have mor…