cyberpriority Profile Banner
CYR3CON Profile
CYR3CON

@cyberpriority

Followers
18
Following
0
Media
21
Statuses
100

CYR3CON uses machine learning to predict and prioritize the latest cyber threats.

Tempe, AZ
Joined July 2020
Don't wanna be here? Send us removal request.
@cyberpriority
CYR3CON
5 years
Watch the final post from Dr. Ericsson Marin showing how to predict imminent cyber threats using information from malicious hacker communities.
0
0
0
@cyberpriority
CYR3CON
5 years
CYR3CON and the team at Tag Cyber have published a new report outlining the enterprise security benefit of mapping CVEs to the offensive tactics included in the MITRE ATT&CK framework. Download the report today!
0
0
1
@cyberpriority
CYR3CON
5 years
The second of three posts from our guest author, Dr. Ericsson Marin, explores the world of online communities of hackers that cyber criminals use to achieve their criminal goals
0
0
0
@cyberpriority
CYR3CON
5 years
Our last short take from the risk3sixty podcast addresses the solution to the ransomware problem and it isn't as complicated as you might think! Watch this final short video from our podcast with the risk3sixty team. https://t.co/622B3D3IMu
0
0
0
@cyberpriority
CYR3CON
5 years
We have a guest author Dr. Ericsson Marin this week! Shift your focus to ask: What if we use the hacker’s resources against them?
0
0
0
@cyberpriority
CYR3CON
5 years
This minute-long quick watch from the risk3sixty podcast stresses the critical need for preparing for an eventual breach. Security vendors need to push CFOs to put expected breach costs on the balance sheet! https://t.co/pyhKmFeacq
0
0
0
@cyberpriority
CYR3CON
5 years
We recently wrapped up our review of Docker and Kubernetes vulnerabilities - start with the first and then be sure to check out all six posts in the series!
0
0
0
@cyberpriority
CYR3CON
5 years
Today's short video from the risk3sixty podcast talks sources! Learn what sources CYR3CON monitors and how social media and other internet resources influence accurate prediction.
0
0
0
@cyberpriority
CYR3CON
5 years
Our final installment in the Vulnerability Management and MITRE ATT&CK series shows why a holistic approach is the best way to disrupt attacker sequences.  
0
0
0
@cyberpriority
CYR3CON
5 years
The risk3sixty podcast has been so popular that we've pulled some short segments highlighting a few key points! Today's short video focuses on how to make cybersecurity more predictive and proactive with the use of machine learning and data mining.
0
0
0
@cyberpriority
CYR3CON
5 years
Read and watch today's post and understand how you can disrupt attack sequences through vulnerability management. 
0
0
0
@cyberpriority
CYR3CON
5 years
The sixth and final post in our series looks at how the Docker and Kubernetes vulnerabilities map to the hierarchical common weakness enumeration (CWE) list. Watch today's post!
0
0
0
@cyberpriority
CYR3CON
5 years
Read and watch today's post as we take a look at how attack sequences can be generated.
0
0
0
@cyberpriority
CYR3CON
5 years
Today's post continues our series on ATT&CK and Vulnerability Management a lists three aspects of alignment that security teams must consider.
0
0
0
@cyberpriority
CYR3CON
5 years
Our fifth post in this series discusses Docker-related CVEs and changes observed during COVID-19, drawing three critical conclusions for vulnerability management teams.
0
0
0
@cyberpriority
CYR3CON
5 years
Read and watch the second post in our series on the relationship between the MITRE ATT&CK framework and the Common Vulnerability Enumeration (CVE) system.
0
0
0
@cyberpriority
CYR3CON
5 years
In today’s blog, we discuss three important observations about the Colonial Pipeline breach and what they mean for cybersecurity teams.
0
0
0
@cyberpriority
CYR3CON
5 years
See the available threat intelligence on vulnerabilities targeted by DarkSide provided by PR1ORITY in today's video and blog.  https://t.co/k2voWClZyU
0
0
0
@cyberpriority
CYR3CON
5 years
Take a look at our recent blog post highlighting the number of Kubernetes CVEs, the changes we've seen, the results of our analysis, and how it impacts organizations using containers.
0
0
0
@cyberpriority
CYR3CON
5 years
Check out our new series! Watch and read our latest blog on MITRE ATT&CK and Vulnerability Management.
0
0
0