Vikram SinghSecurity Orchestration Automation and Response (SOAR)Security orchestration automation and response (SOAR) solutions came into play to solve the cybersecurity challenges. SOAR systems detect…Jan 16, 2023Jan 16, 2023
Vikram SinghCyber Kill Chain: The Seven Steps of a Cyberattack1. ReconnaissanceDec 12, 2022Dec 12, 2022
Vikram SinghWhat skills does an intelligence analyst need?To become a Cyber Threat Intelligence Analyst, you should also understand their roles & responsibilities. Below is the snapshot of what…Nov 22, 2022Nov 22, 2022
Vikram SinghDifference Between Strategic Intelligence & Tactical IntelligenceStrategic and tactical intelligence differ in several ways. Strategic Intelligence is for top executives in cybersecurity to formulate…Nov 15, 2022Nov 15, 2022
Vikram SinghCyber Kill ChainThe Cyber Kill Chain framework, developed by Lockheed Martin (2022), explains how attackers move through networks to identify…Nov 2, 2022Nov 2, 2022
Vikram SinghThreat Modeling ToolsManual threat modeling is generally too time consuming for threat intelligence analysts. Instead, they rely on cyber threat modeling tools…Oct 11, 2022Oct 11, 2022
Vikram SinghCyber Threat Modeling ProcessA threat intelligence professional’s goal is to identify potential cyberthreats and determine their impact. Once the threat intelligence…Sep 13, 2022Sep 13, 2022
Vikram SinghThe DREAD ModelThe DREAD model quantitatively assesses the severity of a cyberthreat using a scaled rating system that assigns numerical values to risk…Aug 23, 2022Aug 23, 2022
Vikram SinghPyramid of Pain — CTIADo you know how to effectively leverage threat intelligence feeds? Do you want to assess threat indicators from an adversary’s perspective…Aug 8, 2022Aug 8, 2022