Forecasting techniques
Scenario generation and forecasting There are several methods of forecasting, but in this blog post, we will explore three popular techniques: cones of plausibility, horizon scanning, and back scanning. We will examine the differences between them and explain when each method
Risks associated with intelligence collection
The risks associated with intelligence collection Intelligence collection is the process of gathering information about various subjects such as governments, organizations, individuals, and other entities. It is an essential aspect of national security and international affairs, but it also poses several
Host and Network based Indicators
A small example of Network and Host based indicators ndicators of compromise (IOCs) are pieces of information that can be used to identify malicious activity or detect security incidents on a network or host. There are two main types of IOCs:
Principles of Intelligence
How we can use the principles of intelligence for better cyber threat intelligence The principles of intelligence refer to a set of guiding principles that are used to inform and guide the intelligence process, regardless of the specific context in which
Intelligence Preparation of the battlefield / Environment
IPB / IPE for Cyber Threat Intelligence Before we start it's useful to understand what IPB/IPE is and how its used. We will then discuss how it has been adapted to fit Cyber Intelligence.Intelligence Preparation of the Environment (IPE) or Intelligence
Threat Actors with examples
Different Threat Actors - Different Objectives There are many different types of threat actors in the cybersecurity landscape, each with their own objectives and associated campaigns. Here are a few examples: Nation-state Actors Nation-state actors are typically government-sponsored groups that engage
How is the threat landscape changing
How is the threat landscape changing and what factors are likely to influence future change. The threat landscape is constantly changing as attackers develop new techniques and exploit new vulnerabilities. Some of the factors that are likely to influence future changes
Conduct collection securely
Taking the right precautions when conducting collection online Conducting collection operations online can be a challenging task, particularly when it comes to protecting the safety and anonymity of individuals involved. Here are some key considerations to keep in mind when conducting
Benefits of Cyber Threat Intelligence
Some basic but obvious benefits of Cyber Threat Intelligence In today's digital world, businesses of all sizes and industries face a growing threat from cyber attacks. These attacks can range from data breaches to ransomware attacks to phishing scams, and they