Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Detection

The Netacea Virtual Waiting Room

Netacea’s Virtual Waiting Room is a cloud-based service that sits in front of your website, mobile app and APIs, controlling the flow of visitors. Guarantee a positive customer omni-channel experience even under extreme conditions such as Black Friday. The use of online services has revolutionised the way we consume everything every day, which has made life great! What’s not so great though is when these services cannot meet the consumer demand that they generate, and then become unavailable.

Building and Evaluating a Threat Intelligence Program (Part 1)

In the previous post, we discussed the basics of Threat Intelligence and its types by throwing light on the concept of knowns and unknowns. In information security, any information which can aid the internal security team in the decision-making process and reduce the recovery time accordingly is considered as threat intelligence. This first part in this series of articles will discuss threat intelligence cycle and its importance.

Introduction to Threat Intelligence and Types

The phrase Threat Intelligence has slowly gained significance in the information security community and their discussions. With the decision makers considering it as a high priority requirement, vendors have launched an array of products which are indeed confusing for an executive with the managerial background. This is an introductory post in our series of detailed discussion on threat intelligence.

Information Leakage of Threat Intelligence, Incident & Status Data

Information leakage of threat intelligence, incident data, and status data can have several legal consequences for organizations. Information leakage can occur due to the misconduct of disgruntled employees or results in by virtue of a nefarious cyber-attack. The underlying sections will take a deep dive into two different scenarios—namely, The Trauma of IP Address Leakage and The Menace of Product Vulnerability Leakage.

Threat Detection with AlienVault® USM: 2-Minute Overview

AlienVault USM simplifies threat detection and analysis. Our unified platform includes pre-integrated tools combined with up-to-the-minute threat intelligence and delivers an easy, effective way to accelerate your threat detection and response. Additionally, our Kill Chain Taxonomy allows you to focus your attention on the most important threats, with attacks classified into five categories and contextual information to help you understand attack intent and threat severity quickly.

Customisable Queuing Pages | Virtual Waiting Room

Netacea Virtual Waiting Room ensures website availability for customer transactions by placing visitors the system cannot cope with into a queue and serving them customisable content. Inform your customers with a branded queuing screen detailing their place in the queue and the estimated waiting time. Encourage customers to spend more by displaying special offers and discount codes.

Threat Actors in Critical Infrastructure: New Trends and Risk Factors

In this on-demand webcast, guest presenter Mike Chaney, who supports the DHS, National Cybersecurity & Communications Integration Center (NCCIC), and David Meltzer, Tripwire CTO, will share best practices to reduce the likelihood and severity of incidents that may significantly compromise the security and resilience of the critical infrastructure.