razz-ma-tazz

When and How to Hire a Threat Intelligence Analyst

WHEN… Threat Intelligence has become the latest marketing buzzword, often abused and misused in an effort to impress a customer base. So, when do you need threat intelligence and when is the right time to hire someone to “provide customers” with threat intelligence? Well, you should never hire someone specifically to provide customers with threat […]

When and How to Hire a Threat Intelligence Analyst Read More »

Three Myths About Threat Intelligence

For new readers, welcome, and please take a moment to read a brief message From the Author. 1. Threat intelligence is something you should provide your customers If threat intelligence products are not your flagship product or primary business function, then threat intelligence is not something you should provide as a product or service directly

Three Myths About Threat Intelligence Read More »

Risk Management and Threat Scoring: a qualitative, quantitative, consistent and repeatable method

For new readers, welcome, and please take a moment to read a brief message From the Author. Executive Summary Threat Intelligence teams and Information Security teams often struggle to communicate to leadership why a specific vulnerability should be taken seriously or given more precedence, especially when the CVSS score is low. This blog is a

Risk Management and Threat Scoring: a qualitative, quantitative, consistent and repeatable method Read More »

OSINT Data Sources: Trust but Verify

Thanks to @seamustuohy and @ginsberg5150 for editorial contributions For new readers, welcome, and please take a moment to read a brief message From the Author.  This article’s primary audience is analysts however if you are in leadership and seek to optimize or maximize the analysis your threat intelligence program is producing you may find this walk

OSINT Data Sources: Trust but Verify Read More »

Outlining a Threat Intel Program

(estimated read time 27min) For new readers, welcome, and please take a moment to read a brief message From the Author. Executive Summary I recently crunched the high level basics of setting up a threat intelligence (abbreviated as Threat Intel) program into a 9-tweet thread, which was met with great appreciation and the feedback solicited unanimously

Outlining a Threat Intel Program Read More »