Get Our Newsletter
Intellyx – The Digital Transformation Experts – Analysts
  • OUR CONTENT
    • Cortex Columns
    • BrainBlog Posts
    • Brain Candy Briefs
    • Brain Dump Articles
    • News Mentions
    • Webinars & Events
    • Whitepapers
    • Thought Leadership Finder
  • Our Services
    • Advisory Offerings
    • Content Marketing Services
    • For Technology Vendors
    • For Business Execs
  • About Us
    • Analyst Team
    • Current Subscribers
    • Media Kit
    • Testimonials
  • CONTACT
    • Request an Inquiry
    • Download the Poster

Tags archive: Cyber Kill Chain

Catphishing: looking for love in the wrong places Forbes Article

Fear These Three Types Of Phish: ‘Catphishing’ Enterprise Targets

October 14, 2017 0

Earlier this month, Forbes staff writer Thomas Fox-Brewster told the frightening tale of how Iranian hackers used a fake Facebook profile to target an unsuspecting…

Brain Candy

Corelight: Commercializing the Bro Open Source Network Monitoring Framework

August 24, 2017 0

An Intellyx Brain Candy Brief Bro is an open source network monitoring framework that originated in the public-sector worlds of academia, national research laboratories, and…

Brain Candy

Corvil: ‘Machine-Time’ Intelligence for Electronic Trading, IT Ops, and Cybersecurity

August 3, 2017 0

An Intellyx Brain Candy Brief The extreme time sensitivity requirements of real-time electronic trading led Corvil to develop an innovative approach to achieving extraordinary precision…

Brain Candy

Cyphort – Combining Machine Learning and Behavioral Analysis to Find and Mitigate Advanced Threats

April 18, 2017 1

An Intellyx Brain Candy Brief Cyphort considers itself the ‘anti-SIEM’ (Security Information and Event Management) because it finds and mitigates threats that bypass traditional SIEM…

Blog Post Mention

RSA 2017 Recap: Enterprises Don’t Want More One-Size-Fits-All Solutions

March 4, 2017 0

By Michael Vaughn NetworkWorld’s Charles Araujo phrased the issue quite well in an article last week: Organizations must also rationalize security data in a business…

Forbes Article

Four Disruptive ‘Cyber Trends’ At RSA

February 20, 2017 0

As an industry analyst and Forbes contributor who writes about digital transformation, I am always looking for stories of disruption. Attending last week’s massive RSA…

RSAC 2026 Conference

Start date: March 23, 2026
End date: March 26, 2026
All-day event
RSAC 2026 March 23-26

KubeCon | CloudNativeCon Europe 2026

Start date: March 23, 2026
End date: March 26, 2026
All-day event
kubecon image

TMForum DTW Ignite

Start date: June 23, 2026
End date: June 25, 2026
All-day event
ignite

RAISE Summit

Start date: July 8, 2026
End date: July 9, 2026
All-day event
raise image
Subscribe to our Cortex & Brain Candy Newsletters!
Download the Poster
JOIN OUR LINKEDIN GROUP!

Categories

  • Article 153
  • Blog Post Mention 1,365
  • Brain Candy 1,841
  • Brain Dump 10
  • BrainBlog 538
  • CIO Article 53
  • CISO Magazine Article 2
  • Cortex Newsletter 246
  • DailyIcoNews Article 22
  • DZone Article 12
  • Featured 770
  • Forbes Article 292
  • Infographic 12
  • News 573
  • Past Events 36
  • Podcast 72
  • SD Times Article 22
  • SiliconANGLE Article 98
  • TechBeacon Article 9
  • Techstrong Article 1
  • The New Stack Article 31
  • Translation 23
  • Uncategorized 285
  • Video 91
  • Webinars & Events 188
  • White Paper 208

Follow Us:

Contact Us:

  agility@intellyx.com
 +1-617-517-4999

The Fine Print

  • Code of Ethics
  • Terms & Conditions
  • Cookies, Privacy, & Security

Upcoming Events

RSAC 2026 Conference

Start date: March 23, 2026
End date: March 26, 2026
All-day event
RSAC 2026 March 23-26

KubeCon | CloudNativeCon Europe 2026

Start date: March 23, 2026
End date: March 26, 2026
All-day event
kubecon image

TMForum DTW Ignite

Start date: June 23, 2026
End date: June 25, 2026
All-day event
ignite

RAISE Summit

Start date: July 8, 2026
End date: July 9, 2026
All-day event
raise image

Tag Cloud

2021 Awards Agile AI AIOps Analyst Award Analytics Artificial Intelligence Automation award Awards award winner Big Data Bitcoin Blockchain BPM Cloud cloud native Compuware Crypto Cryptocurrency Cybersecurity DevOps DigitalInnovator Digital Transformation Enterprise Architecture genAI Generative AI Hybrid IT Innovation Integration Intellyx award Internet of Things IoT IT Operations Kubernetes Low-Code Machine Learning Mainframe Modernization No Code observability RPA SD-WAN Security vendor award

Categories

  • Article 644
    • Brain Dump 10
    • CIO Article 53
    • CISO Magazine Article 2
    • DailyIcoNews Article 22
    • DZone Article 12
    • Forbes Article 292
    • SD Times Article 22
    • SiliconANGLE Article 98
    • TechBeacon Article 9
    • Techstrong Article 1
    • The New Stack Article 31
  • Blog Post Mention 1,365
  • Brain Candy 1,841
  • BrainBlog 538
  • Cortex Newsletter 246
  • Featured 770
  • Infographic 12
  • News 573
  • Past Events 36
  • Podcast 72
  • Translation 23
  • Uncategorized 285
  • Video 91
  • Webinars & Events 188
  • White Paper 208
© Intellyx BV. All rights reserved.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Subscribe to Our Newsletter!

We will send you a weekly digest of our latest thought leadership and articles on disruptive vendors and technology.

  Thank you for Signing Up

Please correct the marked field(s) below.

1,true,6,Contact Email,2 1,false,1,First Name,2 1,false,1,Last Name,2

Read Our Recent Cortex and BrainCandy Newsletters