Adam GossIntelligence Requirements Template (PDF + Word Doc Download)This intelligence requirements template allows you to document your company’s requirements and kickstart your CTI program.Sep 9Sep 9
Adam GossCyber Threat Intelligence Report Template (+FREE Download)A cyber threat intelligence report template saves you and your CTI team valuable time and effort. Here is a FREE template you can use!Aug 26Aug 26
Adam GossinOSINT TeamEssential Threat Intelligence Collection Sources You Need to KnowIntelligence collection sources are the most important component of a CTI program. This guide will teach you everything you need to know.Jun 24Jun 24
Adam GossinOSINT TeamCTI Analysis Bias: How to Overcome Your Prejudices During AnalysisBias is inherent in all CTi analysts. You must learn to overcome it to produce accurate intelligence assessments. This guide will each you.Jun 17Jun 17
Adam GossinOSINT TeamCTI Report Writing: How to Communicate Threat IntelligenceCTI report writing is an essential cyber skill. This guide will teach you why, the key elements to include, and how to write a great…Jun 101Jun 101
Adam GossEstimative Language: How to Assign Confidence to Your AssessmentsEstimative language is fundamental for good cyber threat intelligence reporting. This guide will teach you everything you need to know.Jun 3Jun 3
Adam GossinInfoSec Write-upsIntrusion Analysis: How to Fully Investigate Cyber Security AttacksLearn how to perform intrusion analysis in this comprehensive guide, including a four-step process, tips and tricks, and practical…May 273May 273
Adam GossCrown Jewel Analysis: How to Figure Out What to ProtectCrown Jewel Analysis is a fundamental risk management methodology you should know. This guide will teach you what it is and how to use it.May 20May 20
Adam GossThe Traffic Light Protocol: How to Classify Cyber Threat IntelligenceLearn about how the Traffic Light Protocol (TLP) is used to secure information sharing within the cyber security community.May 13May 13
Adam Goss5 Cyber Kill Chain Challenges and How to PrevailExplore the top five Cyber Kill Chain challenges you will face when using this model in the real world and how to overcome them.May 6May 6