Setting up threat intelligence and vulnerability tracking
Information is power. Take the time to set up your threat intelligence and vulnerability tracking capabilities to ensure that you can see what is going on in your networks as well as what is happening on a larger scale in the security industry.
Vulnerability tracking
Assign someone to track newly discovered vulnerabilities in the software, firmware, and hardware installed within your networks. Track CVE entries within the National Institute of Science and Technology (NIST) National Vulnerability Database at https://nvd.nist.gov/.
Threat intelligence
There are threat intelligence offerings on the market that you may consider. Threat intelligence offerings can provide you with information on threat actors that are targeting your specific industry, along with their motivations. CrowdStrike is a good example of a threat intelligence organization that makes use of multiple intelligence gathering techniques to identify the latest threat actors...