• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Chronicle: A Meteor Aimed At Planet Threat Intel?

October 17, 2018 by Manogna Alahari 1 Comment

https://krebsonsecurity.com/2018/01/chronicle-a-meteor-aimed-at-planet-threat-intel

In this article, it is mentioned, on what factors do the companies rely on security software and what factors do IT staff generally miss out, The article also talks about challenges faced by a new company which is entering into Cyber security or anti virus firm, how the new company example- CHRONICLE- (a malware intelligence service acquired by Google) should be able to differentiate itself from the existing available tools in the market.

https://medium.com/chronicle-blog/give-good-the-advantage-75ab2c242e45

Companies CEO Stephen Gillett mentions that they would include new features like machine learning, artificial intelligence also massive data analytics and storage capabilities which hopefully enable to help these organizations to reach the present standards.

Filed Under: Week 07: NetCat and HellCat Tagged With:

Reader Interactions

Comments

  1. Connor Fairman says

    October 17, 2018 at 3:10 pm

    I think that Chronicle has a very good aim: to help people and corporations make sense of the immense amount of data out there about cyber security threats. As the article states, it is unclear how Chronicle will actually do this, but I think it is a step in the right direction. We even see from our forays with Nessus that having different threats organized into various categories makes things so much more accessible for us. Compare that with Nmap or tcp dump which require a lot of deciphering. If there were software out there to make the data brought in by these methods more accessible to non-technical users, it would be very helpful.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in