Adam GossYARA Rules: Empower Your Security With Custom DetectionsUnlock the power of YARA rules and build your own custom detections. Learn how to write them effectively and use them.·13 min read·2 days ago----
Adam GossinInfoSec Write-upsAnalysis of Competing Hypotheses: How to Find Plausible AnswersThis guide will help you discover the power of the Analysis of Competing Hypotheses technique and learn how to analyze intelligence…·15 min read·Apr 22, 2024----
Adam GossinInfoSec Write-upsThe Diamond Model: Simple Intelligence-Driven Intrusion AnalysisElevate your cyber threat intelligence analysis with the Diamond Model. This full guide will teach you everything to start.·15 min read·Apr 15, 2024----
Adam GossTop 5 Challenges With Indicators and How to Overcome ThemDiscover the top 5 challenges with indicators and how to overcome them to improve the effectiveness of your cyber security operations.·12 min read·Apr 8, 2024----
Adam GossinInfoSec Write-upsHow to Automatically Deploy a Malware Analysis EnvironmentDiscover how to create your own automated malware analysis environment you can deploy in minutes in this hands-on guide.·19 min read·Apr 1, 2024----
Adam GossinInfoSec Write-upsThreat Modeling: A Staple of Great Cyber Threat IntelligenceLearn what threat modeling is, why it is important, and how to perform using STRIDE, DREAD, PASTA, Attacks Trees, and VAST in this guide.·11 min read·Mar 25, 2024----
Adam GossinInfoSec Write-upsHow to Optimize Data Sources: Collection Management FrameworkDiscover the best way of collecting intelligence in this complete guide to collection management frameworks.·11 min read·Mar 18, 2024----
Adam GossinInfoSec Write-upsThe Cyber Kill Chain: How to Map and Analyze Cyber AttacksLearn how to use the cyber kill chain. A framework for understanding cyber attacks, analyzing intrusions, and planning cyber defenses.·14 min read·Mar 11, 2024----
Adam GossTop 5 Challenges When Creating Intelligence RequirementsLearn the top 5 challenges when creating intelligence requirements and strategies you can use to overcome them.·8 min read·Mar 4, 2024----
Adam GossinInfoSec Write-upsHow to Create a Local Kubernetes Cluster: Terraform and AnsibleLearn how to create your very own local Kubernetes cluster automatically using Terraform, Ansible, and the power of infrastructure as code.·18 min read·Feb 26, 2024--1--1