Intelligence Tradecraft

Show
Don’t Just Read Intelligence: Learn From It
January 17, 2019

The Importance of Learning in Cyber Security Those unfamiliar with the field of computer security, reading the news headlines about …

read more

Predator: Modeling the attacker’s mindset

April 2, 2019

Author: Richard Gold  The phrases “attacker’s mindset” or “think like an attacker” are often used in cyber security to encourage …

read more

SANS DFIR Cyber Threat Intelligence Summit 2019 – Extracting More Value from Your CTI Program

February 5, 2019

We were fortunate to attend the 2019 SANS DFIR Cyber Threat Intelligence Summit this year, which brings together some of …

read more

Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

November 27, 2018

Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set …

read more

A Look Back at the ENISA Cyber Threat Intelligence-EU Workshop 2018

November 13, 2018

I recently attended the ENISA (European Union Agency for Network and Information Security) Threat Intelligence Workshop held in Brussels on …

read more

Non-traditional State Actors: New Kids on the Block

September 18, 2018

Cyber threat reporting sits at a dichotomy. On the one hand, much furor is made of the role of non-state …

read more

Security Analyst Spotlight Series: Rose Bernard

May 23, 2018

Organizations rely on our cyber intelligence analysts to be an extension of their security team. Our global team of analysts …

read more

Digital Shadows’ Most Popular Blogs of 2017: Analysis of Competing Hypotheses For The Win

December 12, 2017

This time last year, we looked back at the blogs that caught our readers’ attention the most. In 2016, it …

read more

Return of the Worm: A Red Hat Analysis

September 7, 2017

A computer worm is a piece of malware that is designed to replicate itself in order to spread to other …

read more

All That Twitterz Is Not Gold: Why You Need to Rely on Multiple Sources of Intelligence

August 9, 2017

Twitter has become an extremely valuable tool for security researchers; experts including Kevin Beaumont and PwnAllTheThings frequently post research findings …

read more

What is a Threat Model, and Why Organizations Should Care

July 31, 2017

Many organizations are exquisitely aware that they are the target of a wide-range of cyber-attacks: from targeted intrusions to mere …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive