Adam GossinInfoSec Write-upsThe ATT&CK Navigator: A Powerful Tool for Visualizing Cyber AttacksUnlock the power of the ATT&CK Navigator and learn to visualize and map attack techniques through a user-friendly interface.5d ago5d ago
Adam GossinInfoSec Write-upsATT&CK Powered Suit: Streamline Your Research and Save TimeThere is a new way to unlock the awesome power of MITRE ATT&CK…, and it’s in your web browser. Let me introduce you to the ATT&CK Powered…Nov 81Nov 81
Adam GossCollection Management Framework Template (+FREE Download)This collection management framework template provides you with the structure to effectively document and use your CTI data sources.Oct 23Oct 23
Adam GossIntelligence Requirements Template (PDF + Word Doc Download)This intelligence requirements template allows you to document your company’s requirements and kickstart your CTI program.Sep 9Sep 9
Adam GossCyber Threat Intelligence Report Template (+FREE Download)A cyber threat intelligence report template saves you and your CTI team valuable time and effort. Here is a FREE template you can use!Aug 261Aug 261
Adam GossinOSINT TeamEssential Threat Intelligence Collection Sources You Need to KnowIntelligence collection sources are the most important component of a CTI program. This guide will teach you everything you need to know.Jun 24Jun 24
Adam GossinOSINT TeamCTI Analysis Bias: How to Overcome Your Prejudices During AnalysisBias is inherent in all CTi analysts. You must learn to overcome it to produce accurate intelligence assessments. This guide will each you.Jun 17Jun 17
Adam GossinOSINT TeamCTI Report Writing: How to Communicate Threat IntelligenceCTI report writing is an essential cyber skill. This guide will teach you why, the key elements to include, and how to write a great…Jun 101Jun 101
Adam GossEstimative Language: How to Assign Confidence to Your AssessmentsEstimative language is fundamental for good cyber threat intelligence reporting. This guide will teach you everything you need to know.Jun 3Jun 3
Adam GossinInfoSec Write-upsIntrusion Analysis: How to Fully Investigate Cyber Security AttacksLearn how to perform intrusion analysis in this comprehensive guide, including a four-step process, tips and tricks, and practical…May 273May 273