Posts
-
Aug 13th, 2015
Luke in the Sky with Diamonds
Applying the Diamond Model for Threat Intelligence to the Star Wars’ Battle of Yavin Alternate titles: “Diamonds are a Sith’s best friend” “I used to Bullseye Womp Rats i
-
Jun 29th, 2015
Threat Intelligence within the Risk Management Process
How Threat Intelligence fits within Risk Managment This is the second post in a series exploring the relationship of threat intelligence and risk management. If you missed the previous one, wherein I
-
Feb 15th, 2015
ThreatConnect How To: Pivoting & Exporting Data
Introduction The Diamond Model of Intrusion Analysis is the analytic methodology upon which ThreatConnect is built. Developed by a number of preeminent security researchers and analysts (including o