EclecticIQ
EclecticIQ integrates with MITRE’s ATT&CK framework
EclecticIQ announced the integration with MITRE’s ATT&CK (adversarial tactics, techniques, and common knowledge) Framework. The integration allows insights into …

The great attribution debate: Why we should focus on HOW not WHO
Organisations often don’t understand what they need to be protecting themselves from when it comes to costly cyber-attacks. The threat landscape is becoming ever-more …

Using a robust platform for cyber threat analysis training
We have recognised threats coming more regularly from varied origins such as nation-states, hacktivist and cybercriminal actors. Coupled with many new public policies aimed at …

New infosec products of the week: October 6, 2017
EclecticIQ Platform 2.0 gets intelligence reporting, new UI, and more To remove one of the biggest bottlenecks in threat investigation, EclecticIQ Platform 2.0 now includes …

New infosec products of the week: June 2, 2017
EclecticIQ Platform broadens scope of available cyber threat intelligence The latest version of EclecticIQ Platform, the analyst-centric threat intelligence platform, now …

New infosec products of the week: May 5, 2017
Inside threat detection and alerting from Code42 Code42 introducted Inside Threat Detection to its enterprise data protection and security platform. By generating proactive …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility