Published inInfoSec Write-upsThreat Profiling 101: How to Create a Threat ProfileLearn how to create effective threat profiles to identify and prioritize relevant cyber threats for your organization.May 51May 51
Published inInfoSec Write-upsHow to Build a Cyber Threat Intelligence Collection PlanLearn how to build a cyber threat intelligence collection plan to track your intelligence requirements and make them actionable!Apr 28Apr 28
Published inOSINT TeamHow to Prioritize Customer Needs: Priority Intelligence RequirementsLearn how to create priority intelligence requirements (PIRs) that ensure your CTI team focuses on what matters most to your business.Apr 21Apr 21
Published inInfoSec Write-upsIPCE + PESTLE Analysis: Intelligence Preparation of the Cyber EnvironmentLearn how to use Intelligence Preparation of the Cyber Environment (IPCE) and PESTLE analysis to evaluate risks in your cyber environment.Apr 141Apr 141
Published inOSINT TeamThe 8 Principles of Intelligence: Foundations for Good CTIUnlock the 8 key principles of intelligence to ensure your next CTI product is actionable, timely, and tailored to your intelligence…Apr 7Apr 7
Published inInfoSec Write-upsHow to Plan a CTI Project: Key Documentation You NeedLearn how to plan a CTI project using key documentation in this comprehensive guide. Avoid roadblocks and set your project up for success!Mar 31Mar 31
Published inInfoSec Write-upsUnmasking the Hackers: A Complete Guide to Threat ActorsDiscover how to identify threat actors, their motivation, intent, and capability so you can prioritize your defenses effectively.Mar 24Mar 24
Published inInfoSec Write-upsThe F3EAD Intelligence Loop Explained: A Complete GuideLearn how to use the F3EAD intelligence loop to add structure to your CTI work and generate actionable intelligence in this guide.Mar 17Mar 17
Published inOSINT TeamTop 5 Challenges of Building a CTI Team (+ How to Overcome)Discover the top 5 challenges of building a CTI team and how you can overcome them, from talent acquisition to operational integration.Mar 10Mar 10
Published inOSINT TeamThe History of Cyber Threat Intelligence: Quick Fire GuideDiscover the history of cyber threat intelligence, from the origins of intelligence to the threats CTI must combat today in this guide.Feb 24Feb 24