-
Threat Modeling: A Staple of Great Cyber Threat Intelligence
Learn what threat modeling is, why it is important, and how to perform using STRIDE, DREAD, PASTA, Attacks Trees, and VAST in this comprehensive guide.
-
How to Optimize Data Sources: Collection Management Framework
Discover the best way of collecting intelligence, a collection management framework. This guide will teach you what they are and how to create one.
-
The Cyber Kill Chain: How to Map and Analyze Cyber Attacks
Learn how to use the cyber kill chain. A fundamental framework for understanding cyber attacks, analyzing intrusions, and planning cyber defenses.
-
Top 5 Challenges When Creating Intelligence Requirements
Learn about the top 5 challenges when creating intelligence requirements and strategies you can use to overcome them in this guide.
-
How to Create a Local Kubernetes Cluster: Terraform and Ansible
Discover how to create your very own local Kubernetes cluster automatically using Terraform, Ansible, and the power of infrastructure as code (IaC).
-
Unraveling the Courses of Action Matrix: Full Guide to CoA
Learn about the Courses of Action matrix (CoA) and how it can help your organization accurately assess its defensive capabilities and improve resiliency.
-
Netlas.io: A Powerful Suite of Tools for Threat Hunting
Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add threat intelligence to your investigations, Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add threat intelligence to your investigations, and map your attack surface.
-
Top 5 Cyber Threat Intelligence Lifecycle Challenges
Discover the top 5 threat intelligence lifecycle challenges you will face and how to overcome them to produce actionable intelligence.
-
Malware Configuration Parsers: An Essential Hunting Tool
Learn why malware configuration parsing is an essential skill for any threat hunter, plus how to use a malware configuration parsers to do this automatically.
-
Discover MITRE’s CTI Blueprints: A Revolutionary New Project
Learn about MITRE’s CTI Blueprints project. A revolutionary new CTI project that aims to help analysts deliver high-quality, standardized CTI reports.
-
What Is the Indicator Lifecycle? A Guide to Using Indicators
Discover the indicator lifecycle in this full guide on cyber security indicators. You will learn what indicators are and how to use them best.
-
What Are Intelligence Requirements? A Comprehensive Guide
Learn about cyber threat intelligence requirements, why they are important, and how to create effective intelligence requirements in three simple steps.
-
The Cyber Threat Intelligence Lifecycle: A Fundamental Model
Learn about the cyber threat intelligence lifecycle, the six stages of this fundamental model, and how you can use it in real-world security operations.
-
What is Cyber Threat Intelligence? A Quick Guide
Read this guide to discover what cyber threat intelligence is and how it can benefit you at your business’s operational and strategic levels.
-
The Importance of Clear Definitions in Threat Intelligence
Discover why it is important to have clear definitions for key cyber threat intelligence concepts and how this series can be your reference guide.