The Security Bulldog
  • About
  • Blog
  • Contact
  • Get a Demo
  • Sign In
    Sign in
    The Security Bulldog
    The Security Bulldog
    • About
    • Blog
    • Contact
    • Get a Demo
    • Sign In

    Category: OSINT

    AI vs. Manual Threat Intelligence Sharing

    AI vs. Manual Threat Intelligence Sharing

    Explore the differences between AI-powered and manual threat intelligence sharing, focusing on speed, accuracy, and the importance of human expertise.
    jmajka
    Jeff June 27, 2025

    Announcing the Integration of the Known Exploited Vulnerabilities (KEV) Database into The Security Bulldog’s AI Engine

    In today’s rapidly evolving cyber threat landscape, speed and precision are everything. Security teams are bombarded with thousands of vulnerabilities every week, but not all…

    jmajka
    Jeff March 25, 2025

    Announcing Automated Email Alerts: The Next Leap in Proactive Cybersecurity

    Today’s cyber threats move fast-so your security intelligence should move even faster. That’s why The Security Bulldog is excited to announce our new Automated Email Alert feature,…

    jmajka
    Jeff February 27, 2025

    Cyber Pro Podcast Holistic Cybersecurity Approach and Strategy with Jeff Majka

    Jeff Majka emphasized the importance of a holistic approach to cybersecurity, focusing on the roles and operations of human beings rather than just the deployment…

    jmajka
    Jeff January 14, 2025

    Benefits of Threat Intelligence for Security Teams

    Threat intelligence can significantly enhance the security posture of any business. It equips small and medium-sized businesses with crucial information to strategically defend against ransomware…

    jmajka
    Jeff December 5, 2024

    How Does Threat Intelligence Work?

    Threat intelligence platforms process vast amounts of raw data on emerging and existing threats to enable swift, informed cybersecurity decisions. A comprehensive threat intelligence solution…

    jmajka
    Jeff October 28, 2024

    Understanding Cyber Threat Intelligence: A Comprehensive Guide

    In today’s digitally interconnected world, the threats to cybersecurity have become more sophisticated and relentless. As organizations seek to safeguard their digital assets and data,…

    jmajka
    Jeff May 28, 2024
    The Security Bulldog 3

    CISO Tradecraft Podcast- 178 – Cyber Threat Intelligence with Jeff Majka & Andrew Dutton

    In this episode of CISO Tradecraft, hosts G Mark Hardy and guests Jeff Majka and Andrew Dutton discuss the vital role of cyber threat intelligence…

    jmajka
    Jeff April 24, 2024

    Enhancing Productivity and Accelerating Remediation: The Power of OSINT

    In today’s rapidly evolving digital landscape, the ability to swiftly gather accurate and relevant information is crucial for maintaining security and staying ahead of potential…

    jmajka
    Jeff August 16, 2023

    Recent Posts

    • Threat Intelligence Keyword Generator

      Threat Intelligence Keyword Generator

    • AI vs. Manual Threat Prioritization

      AI vs. Manual Threat Prioritization

    • 10 OSINT Tools for Technology Sector Threats

      10 OSINT Tools for Technology Sector…

    • Top Metrics for AI-Powered Threat Intelligence Teams

      Top Metrics for AI-Powered Threat Intelligence…

    • Cyberattack disrupts operations at Brussels Airport, causes major flight cancellations

      Cyberattack disrupts operations at Brussels Airport,…

    See all
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • October 2024
    • May 2024
    • April 2024
    • August 2023
    • May 2023
    • February 2023
    • November 2022
    • October 2022
    • August 2022
    • February 2022
    • Apache
    • Artificial Intelligence
    • Cyber Threat Intelligence
    • Cybersecurity
    • Hacking Tools
    • IOT
    • Machine Learning
    • Microsoft
    • Open Source Intelligence
    • Open Source Software
    • OSINT
    • Podcast
    • Productivity
    • Remediation
    • Security Operations Center
    • The Security Bulldog
    • Uncategorized
    • Use Case
    • Video

    The Security Bulldog Logo

    The Security Bulldog lowers costs and speeds remediation of vulnerabilities for enterprise cybersecurity teams using a proprietary AI-based intelligence platform.

     

    Useful Links

      • Free Trial
      • About Us
      • Contact

     

    Connect

    Follow us for the latest cybersecurity updates!

    Sign-up

    Subscribe to an annual plan today and get 30 days free.

    Subscribe Now!

    Request a Demo


    By clicking the submit button below, you consent to allow The Security Bulldog to store and process the personal information submitted above to provide you with the content requested

    Privacy Policy | Terms of Service © 2025 - The Security Bulldog