Structured and Machine-Readable Threat Intelligence InformationThreat intelligence deliverables may take different formats, which can be grossly divided into structured and unstructured information…5d ago5d ago
Logical Concepts in Cyber Threat Intelligence AnalysisThe quality of intelligence products depends fundamentally on the data, the information, and the analytical process (including bias)…Nov 25Nov 25
Analysis of Competing HypothesesAnalysis of Competing Hypotheses (ACH) is a structured analytic technique that systematically considers the different hypotheses regarding…Nov 21Nov 21
OPSEC for Cyber Threat IntelligenceProtecting the CTI team, the client, and the intelligence product is paramount for CTI activities. Safeguarding the team means shielding it…Nov 18Nov 18
Boolean Operators in Cyber Threat Intelligence CollectionIt’s a considerable effort to sift through numerous search results (e.g., web pages, documents, and reports) to find relevant data for the…Nov 14Nov 14
Cyber Threat Intelligence Specific SourcesIn this post, we’ll look into the sources, agencies, and tools commonly used in the cyber threat intelligence (CTI) life cycle and discuss…Nov 12Nov 12
Source Reliability, Grading, and AnalysisGrading source and data reliability is critical to the CTI Collection stage. From it, it’s possible to control the history of…Nov 1Nov 1
Collection Plan and Types of SourcesAfter defining the Terms of Reference (ToR), Priority Intelligence Requirements (PIRs), and Requests for Information (RFIs), the CTI team…Oct 28Oct 28
Direction: Terms of Reference, Intelligence Requirements, and Project ReviewExecuting the intelligence cycle starts with Direction, i.e., defining the questions that must be answered by the analyst (the Intelligence…Oct 23Oct 23
The Diamond Model of Intrusion AnalysisThe Diamond Model is a formal analysis framework that aims to study the complex relations inherent to attack activities and incorporates…Oct 18Oct 18