Published inInfoSec Write-upsCTI Notetaking: How to Make Effective Notes and DocumentationElevate your analysis with our ultimate guide to CTI notetaking. Learn the principles, tools, and best practices to master CTI notetaking.6d ago6d ago
Published inInfoSec Write-upsData Collection Methods for CTI: How to Collect DataUnlock cyber threat intelligence with our expert guide on data collection methods, and learn to gather actionable intelligence.Jul 7Jul 7
Published inOSINT TeamDemystifying Source Reliability: How to Ensure Credible CTIMaster CTI source reliability. Our guide for analysts explains how to grade sources using the Admiralty Code to build actionable intel.Jun 30Jun 30
Published inOSINT TeamActive Defense and Cyber Deception: Your Proactive Security GuideLearn how to flip the script on attackers. This comprehensive guide teaches Active Defense and Cyber Deception for cyber security analysts.Jun 23Jun 23
Published inInfoSec Write-upsCyberChef 101: A Quick Guide to The Most Versatile Cyber ToolDiscover CyberChef, the “cyber Swiss army knife” for data analysis. Learn how it can streamline complex analysis tasks for your cyber…Jun 16A response icon2Jun 16A response icon2
Published inInfoSec Write-upsThreat Profiling 101: How to Create a Threat ProfileLearn how to create effective threat profiles to identify and prioritize relevant cyber threats for your organization.May 5A response icon1May 5A response icon1
Published inInfoSec Write-upsHow to Build a Cyber Threat Intelligence Collection PlanLearn how to build a cyber threat intelligence collection plan to track your intelligence requirements and make them actionable!Apr 28Apr 28
Published inOSINT TeamHow to Prioritize Customer Needs: Priority Intelligence RequirementsLearn how to create priority intelligence requirements (PIRs) that ensure your CTI team focuses on what matters most to your business.Apr 21Apr 21
Published inInfoSec Write-upsIPCE + PESTLE Analysis: Intelligence Preparation of the Cyber EnvironmentLearn how to use Intelligence Preparation of the Cyber Environment (IPCE) and PESTLE analysis to evaluate risks in your cyber environment.Apr 14A response icon1Apr 14A response icon1
Published inOSINT TeamThe 8 Principles of Intelligence: Foundations for Good CTIUnlock the 8 key principles of intelligence to ensure your next CTI product is actionable, timely, and tailored to your intelligence…Apr 7Apr 7