Planning

Weve been waiting for someone like you

When and How to Hire a Threat Intelligence Analyst

WHEN… Threat Intelligence has become the latest marketing buzzword, often abused and misused in an effort to impress a customer base. So, when do you need threat intelligence and when is the right time to hire someone to “provide customers” with threat intelligence? Well, you should never hire someone specifically to provide customers with threat […]

When and How to Hire a Threat Intelligence Analyst Read More »

Meeting in session. Shot of a business meeting on the go.

Three Myths About Threat Intelligence

For new readers, welcome, and please take a moment to read a brief message From the Author. 1. Threat intelligence is something you should provide your customers If threat intelligence products are not your flagship product or primary business function, then threat intelligence is not something you should provide as a product or service directly

Three Myths About Threat Intelligence Read More »

Aiming for the highest grades

Risk Management and Threat Scoring: a qualitative, quantitative, consistent and repeatable method

For new readers, welcome, and please take a moment to read a brief message From the Author. Executive Summary Threat Intelligence teams and Information Security teams often struggle to communicate to leadership why a specific vulnerability should be taken seriously or given more precedence, especially when the CVSS score is low. This blog is a

Risk Management and Threat Scoring: a qualitative, quantitative, consistent and repeatable method Read More »

Designer woman drawing a website outline and website ux app development on mobile phone.

Outlining a Threat Intel Program

(estimated read time 27min) For new readers, welcome, and please take a moment to read a brief message From the Author. Executive Summary I recently crunched the high level basics of setting up a threat intelligence (abbreviated as Threat Intel) program into a 9-tweet thread, which was met with great appreciation and the feedback solicited unanimously

Outlining a Threat Intel Program Read More »