Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Context Monthly: Executive intelligence briefing for September 2024

Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from September.

What are Netacea Threat Intel Feeds?

Learn more about Netacea Threat Intel Feeds, including how our customers use them to harden existing defenses, from Netacea CTO & co-founder Andy Still. This video explains how Netacea ensures the accuracy of its threat intelligence, the methods of data distribution, and the practical uses of Threat Intel Feeds in blocking malicious traffic and aiding in decision-making processes.

Stay Focused on Relevant Threat Intel Through Scoring and Expiration

John Lennon popularized the phrase, “Life is what happens when you’re making other plans.” And that’s an apt characterization for how we think about threat intelligence. We tend to focus on it to block or alert-on an attack. Meanwhile life is what’s happening to our threat intel while we’re making these plans. When we don’t pay attention to the threat intelligence lifecycle, we can run into trouble.

What CISOs Need to Know about ThreatQ's Support for the NIS2 Directive

An important deadline is just around the corner for businesses that operate in the European Union (EU): By October 17, 2024, EU Member States must implement the NIS2 Directive into their national laws. Failure by critical infrastructure organizations to comply with additional cybersecurity obligations can result in consequences including financial penalties and reputational damage.

Ransomware in the Global Healthcare Industry

The World Health Organisation (WHO) recently hosted a webinar to discuss the critical importance of cybersecurity in the healthcare sector, which highlighted the severity of the situation the industry is currently facing. Healthcare organisations are increasingly relying on digital systems to facilitate their daily workflow, but the prevalence of outdated legacy technology in the sector is rendering it vulnerable to cyberattacks with severe consequences.