Estimative language is fundamental for good cyber threat intelligence reporting. This guide will teach you everything you need to know, from probability terms to confidence levels.
Crown Jewel Analysis is a fundamental risk management methodology you should know. This guide will teach you what it is, how to use it, and tools to help.
Learn the Traffic Light Protocol (TLP). A fundamental cyber threat intelligence framework used to classify information for secure intelligence sharing.
Unlock the power of YARA rules and build your own custom detections. Learn how to write them effectively and use them in the real world with examples.
Learn what threat modeling is, why it is important, and how to perform using STRIDE, DREAD, PASTA, Attacks Trees, and VAST in this comprehensive guide.
Discover the best way of collecting intelligence, a collection management framework. This guide will teach you what they are and how to create one.
Learn about the Courses of Action matrix (CoA) and how it can help your organization accurately assess its defensive capabilities and improve resiliency.
Discover the indicator lifecycle in this full guide on cyber security indicators. You will learn what indicators are and how to use them best.
Learn about cyber threat intelligence requirements, why they are important, and how to create effective intelligence requirements in three simple steps.
Learn about the cyber threat intelligence lifecycle, the six stages of this fundamental model, and how you can use it in real-world security operations.
Read this guide to discover what cyber threat intelligence is and how it can benefit you at your business's operational and strategic levels.
Discover why it is important to have clear definitions for key cyber threat intelligence concepts and how this series can be your reference guide.