Verint Blog

5 Things to Consider When Choosing a Modern Lawful Interception Monitoring Center

by Tom Sadon

posted at August 1, 2019

Lawful interception (LI) monitoring centers allow law enforcement agencies and intelligence organizations, to track and monitor communications of specific targets. To successfully accelerate investigations of terrorism, criminal actions and other threats, LI monitoring centers should include advanced capabilities for data collection, data analysis and court-compliance data. Modern LI monitoring centers use advanced technologies based on

The Data Breach Epidemic – Key Findings from Verint’s comprehensive CTI report

by Verint Cyber Threat Intelligence Research Team

posted at July 16, 2019

In the past few years we have witnessed a growing number of significant data breaches. The Data Breach Epidemic Report reviews the most significant data breaches that occurred in 2018 and provides our analysis of the major data leaks. It also includes key trends we identified based on ~5B leaked records detected and analyzed by

Demonstrating the Importance of Intelligence for National Security at ISDEF 2019

by Colleen Gustitus

posted at May 28, 2019

Though the meaning of “security” has evolved significantly over the last several years, one fact remains certain: protecting people, property, and assets has never been more important than in today’s rapidly expanding risk landscape. In addition, while this applies to mission-critical organizations of all shapes and sizes, there is one market that must contend with

The Awakening of PoS Malware (or, has it really been dormant?)

by Verint Cyber Threat Intelligence Research Team

posted at May 7, 2019

The peak of activity of Point-of-Sale (PoS) malware was in late 2013 (with the disclosure of the notorious Target breach[1]), and over the course of 2014, when we witnessed the development and trade of new PoS malware strains. The vigorous discussions on hacking communities at the time, has led hackers to believe PoS malware would