Understanding Cyber Threat Intelligence: A Comprehensive Guide

In today’s digitally interconnected world, the threats to cybersecurity have become more sophisticated and relentless. As organizations seek to safeguard their digital assets and data, the role of Cyber Threat Intelligence (CTI) has become increasingly critical. But what exactly is Cyber Threat Intelligence, and why is it so pivotal in the modern security landscape? In…

Read More

CISO Tradecraft Podcast- 178 – Cyber Threat Intelligence with Jeff Majka & Andrew Dutton

The Security Bulldog 3

In this episode of CISO Tradecraft, hosts G Mark Hardy and guests Jeff Majka and Andrew Dutton discuss the vital role of cyber threat intelligence in cybersecurity. They explore how Security Bulldog’s AI-powered platform helps enterprise cybersecurity teams efficiently remediate vulnerabilities by processing vast quantities of data, thereby saving time and enhancing productivity. The conversation…

Read More

Enhancing Productivity and Accelerating Remediation: The Power of OSINT

In today’s rapidly evolving digital landscape, the ability to swiftly gather accurate and relevant information is crucial for maintaining security and staying ahead of potential threats. This is where OSINT (Open Source Intelligence) comes into play, emerging as a pivotal tool in improving productivity and expediting the time it takes to address vulnerabilities. In this…

Read More

Is CVE-2022-42889 Important to You? How long does it take to find out?

The Security Bulldog 3

Is CVE-2022-42889 important to you? You have no idea unless you know this CVE is an Apache Commons Text code injection vulnerability. And…you would only care if you had Apache in your IT environment. And…given the lack of visibility into your open-source software supply chain, that is hard to know. Figuring this out manually would…

Read More

Is CVE-2022-34718 Important to You?

The Security Bulldog 3

Is CVE-2022-34718 important to you? You have no idea unless you know that this CVE is the Windows TCP/IP Remote Code Execution Vulnerability and you would only care if you had Microsoft in your IT environment. Figuring this out manually would take forever. The good news is that we partnered with cybersecurity professionals to build…

Read More

Security Teams are Wasting Time

I don’t know if you saw this article that appeared in Dark Reading by Ericka Chickowski. It’s related to the issues we talk about here at The Security Bulldog. 3 Places Security Teams Are Wasting Time A great quote: “Approximately 58% of security decision-makers agree that machine learning and AI should help make the job…

Read More

How to Set Up Your The Security Bulldog Account

This is a short video to show you the simple, fast way to set up your profile. The platform is powered by an Artificial Intelligence Natual Language Processing tool. It needs a minimal amount of data to get started, which is what this setup stage is meant to accomplish. Afterward, the tool will improve by…

Read More