Pulsedive Blog

Read. Learn. Defend.

  • Read
  • Contribute
threat intelligence

Vetting Threat Intelligence

If your organization has ever gotten an alert for “facebook.com” because someone didn’t vet indicators of compromise properly somewhere along the chain between threat intelligence generation by a third-party and consumption

  • Dan Sherry
    Dan Sherry
5 min read
passwords

Your Password Policy Doesn't Work

Your employer’s password policies are stupid and you know it. If for some reason you love your employer’s password policies, then hopefully you will be disappointed by the end of this

  • Dan Sherry
    Dan Sherry
19 min read
malware

Should You Pay Hacker Ransom?

If you haven’t heard by now, Uber paid hackers $100,000 in ransom last year in exchange for deleting the stolen personal information of 57 million victims. Hackers have also been know

  • Dan Sherry
    Dan Sherry
3 min read
threat intelligence

What is Threat Intelligence?

A quick Google search suggests that a consensus has not quite been reached on defining the term “cyber threat intelligence.” There are some blog posts (yep, this one too) and even white papers

  • Dan Sherry
    Dan Sherry
4 min read
© 2021 Pulsedive
Latest Posts Twitter Slack