By This Author
4 hiring tips for building a cyber threat intelligence team 4 hiring tips for building a cyber threat intelligence team
August 23, 2022
Threat intelligence So you’re thinking about starting a cyber threat intelligence team… So you’re thinking about starting a cyber threat intelligence team…
September 30, 2021
Threat intelligence Microsoft Exchange server exploitation: how to detect, mitigate, and stay calm Microsoft Exchange server exploitation: how to detect, mitigate, and stay calm
March 9, 2021
Threat intelligence Remapping Red Canary with ATT&CK sub-techniques Remapping Red Canary with ATT&CK sub-techniques
October 1, 2020
MITRE ATT&CK Getting started in cyber threat intelligence: 4 pieces of advice Getting started in cyber threat intelligence: 4 pieces of advice
September 15, 2020
Threat intelligence Hello world: on finding my voice Hello world: on finding my voice
June 16, 2020
Opinions & insights Endpoint security: what’s changed and what hasn’t? Endpoint security: what’s changed and what hasn’t?
May 19, 2020
Security operations A practical approach to threat modeling A practical approach to threat modeling
May 12, 2020
Threat intelligence