Blog
Summary of DORA and Its Connection to CTI
The Digital Operational Resilience Act (DORA), effective from January 17, 2025, establishes comprehensive guidelines to strengthen the digital resilience of financial entities across the European Union. It mandates robust measures for managing ICT risks, responding effectively to cyber incidents, and fostering the exchange of cyber threat intelligence. DORA applies to a diverse range of financial…
Threat Hunting Essential Steps and Key Components
Threat hunting is a proactive cybersecurity practice aimed at detecting, investigating, and mitigating advanced threats that may evade traditional security tools such as firewalls and antivirus software. Unlike reactive approaches like incident response, which wait for alerts from systems, threat hunting actively searches for potential threats by looking for patterns, anomalies, and behaviors in networks, systems,…
Evaluating Threat Intelligence Feeds: Key Metrics
When selecting a threat feed provider, it’s crucial to assess how effectively their feed will integrate with your threat detection and response strategy. Below are key metrics to consider: Metric Description Value False Positives (FPs) Triggered Over the Period Measures the number of incorrect alerts generated by the feed. A lower number indicates less noise…