Security Orchestration Automation and Response (SOAR)Security orchestration automation and response (SOAR) solutions came into play to solve the cybersecurity challenges. SOAR systems detect…Jan 16, 2023Jan 16, 2023
What skills does an intelligence analyst need?To become a Cyber Threat Intelligence Analyst, you should also understand their roles & responsibilities. Below is the snapshot of what…Nov 22, 2022Nov 22, 2022
Difference Between Strategic Intelligence & Tactical IntelligenceStrategic and tactical intelligence differ in several ways. Strategic Intelligence is for top executives in cybersecurity to formulate…Nov 15, 2022Nov 15, 2022
Cyber Kill ChainThe Cyber Kill Chain framework, developed by Lockheed Martin (2022), explains how attackers move through networks to identify…Nov 2, 2022Nov 2, 2022
Threat Modeling ToolsManual threat modeling is generally too time consuming for threat intelligence analysts. Instead, they rely on cyber threat modeling tools…Oct 11, 2022Oct 11, 2022
Cyber Threat Modeling ProcessA threat intelligence professional’s goal is to identify potential cyberthreats and determine their impact. Once the threat intelligence…Sep 13, 2022Sep 13, 2022
The DREAD ModelThe DREAD model quantitatively assesses the severity of a cyberthreat using a scaled rating system that assigns numerical values to risk…Aug 23, 2022Aug 23, 2022
Pyramid of Pain — CTIADo you know how to effectively leverage threat intelligence feeds? Do you want to assess threat indicators from an adversary’s perspective…Aug 8, 2022Aug 8, 2022