Posts
-
Sep 26th, 2023
Intelligence-Powered Cybersecurity for State, Local, and Territorial Governments
State, local, and tribal (SLT) governments are responsible for numerous critical services like educating children, providing safe drinking water, delivering safety and emergency services, managing air
-
Sep 21st, 2023
The 7 Tenets of Threat Intelligence Operations – Tenet #5: Automate TI Ops Work
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet 5
-
Sep 20th, 2023
Create Intelligence Requirements in 5 Easy Steps
How to Understand Intelligence Requirements As threat landscapes morph, intelligence requirements have emerged as a vital tool for cyber threat research and analysis. These are topics or research ques
-
Sep 12th, 2023
Top 5 Use Cases for ATT&CK Visualizer
The cybersecurity landscape is complex and fraught with many threats and vulnerabilities. Understanding and navigating this space requires access to up-to-date information on the activities of threat
-
Aug 29th, 2023
The 7 Tenets of Threat Intelligence Operations – Tenet #4 – Go Beyond IoCs
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet #4 &
-
Aug 24th, 2023
That’s A Wrap From Black Hat USA 2023
Another Black Hat USA is in the books, and we’re already looking forward to 2024. The energy across the event was great, and as always, it was fun to catch up with colleagues, customers, and friends
-
Jul 31st, 2023
The Tenets of Threat Intel Operations – Tenet #3
In the first blog of this series, I took a 30,000-foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet #3 &
-
Jul 26th, 2023
ThreatConnect 7.2: Harnessing ATT&CK Visualizer for Evolved Threat Intel
Today, we’re launching version 7.2 of the ThreatConnect TI Ops Platform. It’s an exciting day because, with this release, we’re giving a massive upgrade to our customers with some fantastic new
-
Jul 12th, 2023
The 7 Critical Elements of a Robust PIR
Threat intelligence is crucial in understanding the threat landscape and making informed decisions. Priority Intelligence Requirements (PIRs) are central to effective threat intelligence planning and
-
Jul 6th, 2023
The Future of Threat Intelligence for Large Enterprises
The evolving cyber threat landscape demands an innovative approach to cybersecurity, especially for large enterprises. Retail organizations and banks, in particular, face complex challenges in managin
-
Jun 28th, 2023
Why Threat Intel is Critical for Supply Chain Security
In today’s interconnected world, organizations rely heavily on a complex network of suppliers and vendors critical to their operations. They supply software used across an enterprise and provide
-
Jun 8th, 2023
Applying the Diamond Model for Threat Intelligence to the Star Wars’ Battle of Yavin
Alternate titles: “Diamonds are a Sith’s best friend” “I used to Bullseye Womp Rats in my t-shirt back home.” “That’s no Shamoon…it’s a space stat