Recorded Future
Follow
2016 Followers
Follow Recorded Future on their other social channels!
About Us
Founded:
2009
Company Size:
51-200 employees
Company Type:
Private
Location:
Somerville, MA
Website:
Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources and provides invaluable context that’s delivered in real time and packaged for human ...
Read more
Promoted Content
Best Practices for Applying Threat Intelligence
Follow
153
Threat Intelligence: Difference Between Platforms and Providers
The world of threat intelligence can be a bit confusing. Take a scan through any resource or blog related to threat intelligence (including ours) and you’ll see references to threat intelligence platforms, sources, providers, feeds … the list goes on. And, naturally, they all mean something slightly different. But if you aren’t yet familiar with the way a powerful threat intelligence facility operates, these terms can be difficult to wrap your head around. To find some clarity, le ...
Follow
356
Announcing Recorded Future’s New Training Program
We’re excited to announce Recorded Future’s new full-scale training program aimed at maximizing threat intelligence investment in Recorded Future and reducing security risk. Complete with seminars, workshops, and certification, the program will introduce new training segments to empower users to get up to speed quickly using the Recorded Future product, while supplementing the world-class configuration, education, and support services already delivered to our customers. Read all about ...
Follow
573
How to Explain the Meteoric Rise of Threat Intelligence
This blog first published by Recorded Future, January 12, 2017Key TakeawaysIn the past, cyber security has been a largely reactive discipline. Now, threat intelligence enables companies to get ahead of their attackers, and avoid costly breaches.According to the latest research, over two thirds of organizations have either implemented or plan to implement a threat intelligence solution.There are three primary ways in which using threat intelligence can enhance your security profile: Increasi ...
Follow
558
From Chasing Risk Lists to ASN Policies: Large-Scale Analysis of Risky Internet Activity
From Chasing Risk Lists to ASN Policies: Large-Scale Analysis of Risky Internet Activity Read the full post on the Recorded Future blog Security professionals have the mandate to protect their networks from communication with malicious traffic. There is a clear understanding that some elements of the internet are more malicious than others. For example, we might assume that traffic from certain countries seems more suspicious than others, and that some hosting infrastructures are more like ...
Follow
646
The Threat Intelligence Tightrope
This content was originally posted on Recorded Future. The entire article can be read here.As with every aspect of information security, our challenge is one of balance. For example, often you’ll need to balance control with usability when implementing technologies to prevent security from negatively impacting the effectiveness of your organization.In the case of how to access and apply threat intelligence, your two key concerns will be time and context. Here’s why these factors ma ...
Follow
1715
6 Surprising Benefits of Threat Intelligence From the Web
This content was originally posted on Recorded Future. The entire article can be read here.Sourcing threat intelligence from the web is hardly a new thing. After all, companies in the threat intelligence space have been sharing valuable information for several years now, and with the spate of high-profile breaches in recent months some private organizations are starting to see the light. But that’s not the only thing on offer. If you know where to look, or have a platform setup ...
Follow
3353
3 Threat Intelligence Tips for World-Class Security
Original Source: Threat Intelligence Tweaks That’ll Take Your Security to the Next Level Key Takeaways: Conduct internal hunting projects to maintain strong, skilled, and battle-tested security teams. If your needs aren’t serviced by the market, creating a proprietary capability in-house may well be the best use of resources. Rigorously test your defensive capabilities by collaborating with your red team on real-world POC exercises. Addictive, isn’t it? Hunting ...
Follow
1796
How to Know When You Need Threat Intelligence
Original Source: 3 Signs Your Information Security Team Needs Threat Intelligence Be honest, sometimes you aren’t sure. Your information security team seems to be getting on with things. They fix vulnerabilities, brief your staff, and implement security procedures. But how can you be sure they’re doing everything possible to protect your organization? Well, the best thing you can do is to ensure they have the threat intelligence needed to inform their actions. Here are thr ...
Follow
3005
4 Rules for Building a Successful Threat Intelligence Team
Original Source: 4 Rules for Successful Threat Intelligence Teams Threat intelligence is quickly becoming a core element of risk management for many enterprises. To truly understand risk, though, the enterprise must grasp and have the capability to handle emerging information security threats to its environment. Other areas of risk — financial risk, operational risk, geopolitical risk, risk of natural disasters — have been part of organizations’ risk management plans since time i ...
Follow
1588
EMC2: How to Add Real-Time Threat Intelligence to RSA Archer
Recorded Future has helped EMC create a streamlined process for understanding their situational awareness. Find out how Recorded Future works with EMC and how Archer works with Recorded Future’s content while also learning the workflow of how that data is used within Archer. Original Source: On-Demand Webinar: Adding Real-Time Threat Intelligence to RSA Archer

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel