Platform
Why Flashpoint?
Learn more about Flashpoint’s products and services.
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Management (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Threat Response & Readiness
Professional Services
Managed Intelligence
Tailored Reporting
Curated Alerting
Request for Information (RFI)
Data-as-a-Service
Solutions
By Threats and Risks
Account Takeover
Ransomware
Protective Intelligence
By Industry
Financial Services
Retail
Healthcare & Pharmaceuticals
Technology
Public Sector & National Security
Resources
Case study
How Flashpoint Helped CSI (NY) Stop a Potential Synagogue Attack
Threat Intel Blog
Events & Webinars
Resource Library
Cybersecurity Glossary
Partners
Company
About Us
Careers
News
Contact Us
Get a Demo
Log in
Why Flashpoint?
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Management (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Ransomware Attack Response and Readiness
Professional Services
Tailored Reporting
Curated Alerting
Managed Intelligence
Request for Information
Solutions
By Threats and Risks
Account Takeover
Ransomware and Data Extortion
Protective Intelligence
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resource Library
Threat Intelligence Blog
Events & Webinars
Resource Library
Cybersecurity & Intelligence 101
Partner With Flashpoint
Company
About Us
Flashpoint Careers
Flashpoint News
Contact Us
Platform
Why Flashpoint?
Learn more about Flashpoint’s products and services.
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Management (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Threat Response & Readiness
Professional Services
Managed Intelligence
Tailored Reporting
Curated Alerting
Request for Information (RFI)
Data-as-a-Service
Solutions
By Threats and Risks
Account Takeover
Ransomware
Protective Intelligence
By Industry
Financial Services
Retail
Healthcare & Pharmaceuticals
Technology
Public Sector & National Security
Resources
Case study
How Flashpoint Helped CSI (NY) Stop a Potential Synagogue Attack
Threat Intel Blog
Events & Webinars
Resource Library
Cybersecurity Glossary
Partners
Company
About Us
Careers
News
Contact Us
Get a Demo
Log in
Posts Tagged With
intelligence program
Public Sector and Government
Boost Analyst Success with Intuitive Intelligence Tools
To promote shorter leaning curves and better user adoption and efficiency, intelligence leaders should procure ...
Read post
Cyber Threat Intelligence
Applying the Threat Intelligence Lifecycle for Physical Security
The threat intelligence lifecycle is a fundamental framework applicable for any fraud, physical or cyber security ...
Read post
Cyber Threat Intelligence
The Three P’s of Contingency Planning: People, Process, and Products
Most of us have been accustomed to working and collaborating in an environment which has some degree of ...
Read post
Current events
COVID-19 Key Developments: March 28-April 3
Flashpoint analysts share their observations from the week of March 28 through April 3 with regards to ...
Read post
Cyber Threat Intelligence
Considerations for Updating Near-Term Intelligence Requirements in Response to COVID-19
Amid the many challenges and changes that COVID-19 has presented organizations with, Flashpoint has received many ...
Read post
Cyber Threat Intelligence
4 Steps Toward Evolving Your Risk Intelligence Program
Most professionals know that they need an intelligence program, but do not know where to start. My aim is to help ...
Read post
Cyber Threat Intelligence
U.S. Department of Justice Shares Best Practices for Gathering Threat Intelligence
This week, the U.S. Department of Justice (DoJ) published “Legal Considerations when Gathering Online Cyber ...
Read post
Cyber threat intelligence
The Fraud Intelligence Cycle
Usage of the intelligence cycle in the commercial sector is often relegated—and in many cases, exclusively ...
Read post
Cyber threat intelligence
Ensure Measurements of Your Intelligence Program Don’t Prioritize Vanity Metrics
Vanity metrics get a bad rap—and most of the time, deservedly so. While their usage is often relegated to data ...
Read post