Recorded Future
Follow
2076 Followers
Follow Recorded Future on their other social channels!
About Us
Founded:
2009
Company Size:
51-200 employees
Company Type:
Private
Location:
Somerville, MA
Website:
Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources and provides invaluable context that’s delivered in real time and packaged for human ...
Read more
Promoted Content
Get Trending Threat Insights Delivered to Your Inbox With Our Free Cyber Daily
Follow
81
Retailers Must Adopt a Proactive Intelligence-Driven Security Strategy
Retailers are under siege from cybercriminals. With the advent of e-commerce over two decades ago, the retail industry entered into the digital age where retailers have the opportunity to collect more information about their customers than ever before. Shortly after online shopping became popular, the stakes grew significantly for organizations to protect their customer information and keep their websites available. This digital transformation did not end with the e-commerce channel ...
Follow
123
The Real Security Benefits You Can Get From Threat Intelligence
What’s the first thing that comes to mind when you think of threat intelligence? Most people imagine that it’s the opportunity to “get ahead of attackers” — the idea that powerful threat intelligence will allow you to know precisely when, where, and by whom you’ll be attacked. And sure, sometimes that really is possible. Hacktivist groups occasionally publish their targets in advance, and might use a predictable set of tactics, techniques, and procedures (TTPs). But most ...
Follow
71
5 Ransomware Trends to Watch in 2018
Last year, I published my predictions for ransomware trends, some of which turned out to be correct — others, not so much. For example, ransomware becoming part of a number of different attack groups’ toolsets and the continued growth of fileless malware were accurate predictions. On the other hand, predicting a rise in ransomware designed to publicly shame victims as well as ransomware declining because of law enforcement actions were incorrect. While ransomware is on the decline, th ...
Follow
917
Why Cybersecurity Is More Difficult Today Than 2 Years Ago
Rather than waiting with the lights turned off and hoping for the best, organizations are increasingly recognizing the value of taking proactive steps toward building a more secure network and identifying cyber threats, building security operations centers, purchasing threat detection technologies, and creating cyber threat intelligence programs that incorporate threat data feeds and help to identify and prevent attacks before they happen.Recent research produced by ESG, a technology consulting ...
Follow
744
The 5 Most Relevant Questions for a SOC Analyst
Our guest today is Denver Durham. He’s a threat intelligence consultant at Recorded Future, with a background in the U.S. Army as an intelligence analyst, working in signals intel and all-source intel supporting counterterrorism, and later in the private sector in a SOC (security operations center) as a cyber threat analyst, performing attribution and analytics. On today’s show, he takes us through what he believes are some of the most relevant questions for a SOC analyst, including coll ...
Follow
677
5 Phases of the Threat Intelligence Lifecycle
Facts in the intelligence community have a limited shelf life. Threat intelligence is nearly always contextual and temporal: Threats come at a definite time and place, attacking specific vulnerabilities in particular systems. To develop effective threat intelligence, it is essential that you identify the elements — beyond mere data — that actually comprise it, and understand how the intelligence lifecycle unfolds. Intelligence and Threat Intelligence Intelligence is the product of a proc ...
Follow
619
5 Machine Learning Questions Answered
The concepts of machine learning aren’t necessarily easy for all of us to understand, but as the impact of AI technologies in life and work is beginning to be felt more keenly than ever, we have more questions about the difference they are making to our world. The continuous improvement in the speed of computing and our access to the vastly increased amounts of available data means that today, machine-learning applications sit in connected speakers in our kitchens and the phones in the palm of ...
Follow
582
Disrupting the Disruptors: How to Threat Hunt Like a Pro
Editor’s Note: The following blog post is a summary of an RFUN 2017 customer presentation featuring Ismael Valenzuela from McAfee. Key Takeaways Going from responding to incidents to actively hunting threats is a stance shift that requires maturity in an information security operations center, says Ismael Valenzuela, a cybersecurity veteran at McAfee. Maturity means first covering the security fundamentals in your organization before cyber threat hunting. It takes experience, critic ...
Follow
1174
Dark Web Threats: From Technical to Tactical
The dark web is a mass of marketplaces and communities that can only be accessed through encrypted connections. The nature of dark web content is diverse, and the characters who live there range from those looking to purchase counterfeit goods, to drug dealers and cybercriminals. We’ll be focusing on this last category and exploring some examples of how threat actors use the dark web to conduct business, develop new threats, and trade techniques. Selling Data and Credentials Certain dark web ...
Follow
920
Dissecting the Costs of Cybercriminal Operations
Everything has its price on dark web, and almost anything can be sold or bought openly. Although sometimes it seems that to succeed in cybercrime, a person must be a Jack of all trades, in reality almost every criminal endeavor requires various tools and services provided by a network other members. The cybercriminal underground is quite verticalized, with threat actors specializing in particular areas of expertise. It is this distribution of expertise that contributes to the underground mark ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel