Adam GossThe Diamond Model: Simple Intelligence-Driven Intrusion AnalysisElevate your cyber threat intelligence analysis with the Diamond Model. This full guide will teach you everything to start.·16 min read·3 days ago----
Adam GossTop 5 Challenges With Indicators and How to Overcome ThemDiscover the top 5 challenges with indicators and how to overcome them to improve the effectiveness of your cyber security operations.·12 min read·Apr 8, 2024----
Adam GossinInfoSec Write-upsHow to Automatically Deploy a Malware Analysis EnvironmentDiscover how to create your own automated malware analysis environment you can deploy in minutes in this hands-on guide.·19 min read·Apr 1, 2024----
Adam GossThreat Modeling: A Staple of Great Cyber Threat IntelligenceLearn what threat modeling is, why it is important, and how to perform using STRIDE, DREAD, PASTA, Attacks Trees, and VAST in this guide.·12 min read·Mar 25, 2024----
Adam GossHow to Optimize Data Sources: Collection Management FrameworkDiscover the best way of collecting intelligence in this complete guide to collection management frameworks.·11 min read·Mar 18, 2024----
Adam GossinInfoSec Write-upsThe Cyber Kill Chain: How to Map and Analyze Cyber AttacksLearn how to use the cyber kill chain. A framework for understanding cyber attacks, analyzing intrusions, and planning cyber defenses.·14 min read·Mar 11, 2024----
Adam GossTop 5 Challenges When Creating Intelligence RequirementsLearn the top 5 challenges when creating intelligence requirements and strategies you can use to overcome them.·8 min read·Mar 4, 2024----
Adam GossinInfoSec Write-upsHow to Create a Local Kubernetes Cluster: Terraform and AnsibleLearn how to create your very own local Kubernetes cluster automatically using Terraform, Ansible, and the power of infrastructure as code.·18 min read·Feb 26, 2024--1--1
Adam GossUnraveling the Courses of Action Matrix: Full Guide to CoALearn about the Courses of Action matrix and how it can help your organization assess its defensive capabilities and improve resiliency.·11 min read·Feb 19, 2024----
Adam GossNetlas.io: A Powerful Suite of Tools for Threat HuntingDiscover netlas.io, a powerful suite of tools to enrich your threat hunts, add intel to your investigations, and map the attack surfaces6 min read·Feb 12, 2024----