-
Visual Threat Intelligence: A Masterpiece of Infographics and Storytelling
Let’s take a look at Visual Threat Intelligence by Thomas Roccia and discover why it is so popular in the cyber security community in this complete review.
-
Threat Intelligence with MISP: Part 2 – Setting up MISP
Learn how to install and set up MISP. You will discover the various installation methods available, which is best, and how to configure your MISP instance to begin ingesting threat intelligence.
-
Cyber Threat Intelligence with MISP: Part 1 – What is MISP?
Discover the premier open-source threat intelligence sharing platform, its key features, and how you can use it to elevate your security posture!
-
5 Mistakes I Made as a New Cyber Threat Intelligence Analyst
Being a cyber threat intelligence analyst is a difficult job. Here are the top 5 mistakes I made when I first started that you can learn from and avoid.
-
Threat Profiling: How to Understand Hackers and Their TTPs
Begin understanding how attackers think by performing threat profiling to map out how they might attack your organization using the MITRE ATT&CK matrix.
-
How Cyber Security Work Is Changing? The New Gig Economy
Discover how the cyber world is shifting to a new era of employment with the emergence of the gig economy so you can take advantage of it and stay relevant.
-
How to Build the Ultimate Enterprise-Ready Incident Response Playbook
Learn the key components of incident response playbooks, how to create your own, and the best implementation practices to get them enterprise ready.
-
Day in the Life of a Senior Threat Intelligence Analyst
Discover what a typical workday looks like for a senior cyber threat intelligence analyst, the daily tasks I perform, and what you can expect in this role.
-
5 Ways to Use ChatGPT to Create Cyber Security Tools
Learn 5 ways to use AI and ChatGPT to create custom tools that you can use in your day-to-day work to improve your organization’s cyber security posture.
-
Python Threat Hunting Tools: Part 10 — The Power of Jupyter Notebooks
Discover what Jupyter Notebooks are and learn how to create your own to structure your threat hunting workflow and improve your efficiency.
-
7 of the Best Notetaking Apps for Cyber Security Professionals
Learn 7 of the best cyber security notetaking applications you can use to capture your thoughts, document what needs to be done, and create a knowledge base.
-
Python Threat Hunting Tools: Part 9 — Creating Python Packages with Poetry
Learn to create your own Python packages using the Python module Poetry. This lets you easily share your threat hunting tools with the community.
-
Why Soft Skills Matter in Cyber Security and Practicing Them
Discover what soft skills are and why they are so important to master if you want to excel in the cyber security industry and reach your full potential.
-
Why Fake It Till You Make Is a Lie: Fight Imposter Syndrome
Find out how you can fight imposter syndrome by finding confidence in the work you do rather than living a lie and faking it till you make it.
-
Python Threat Hunting Tools: Part 8 — Parsing JSON
Discover how to extract valuable information from JSON to analyze it and turn it into threat intelligence or IOCs to hunt for in your environment.