Articles

Threat Intelligence

The Benefits of Utilizing the OCTAVE Threat Model
The Benefits of Utilizing the OCTAVE Threat Model 

The Benefits of Performing Threat Modeling with OCTAVE | Sydney Chamberlain |Threat Intelligence As business environments grow increasingly complex, it’s more important than ever that IT and cybersecurity professionals come together to utilize proven frameworks capable of guiding a comprehensive, systematic assessment of an organization’s IT risks. The OCTAVE model is widely regarded as the…

Read article
Threat Intelligence adoption
Why Organizations Need to Deliberately Adopt Threat Intelligence

Why Organizations Need to Deliberately Adopt Threat Intelligence Every organization will, one way or another, land on the radar of cybercriminals or hackers who have an incentive to compromise their systems. Threat intelligence has therefore become a top priority for many organizations around the world. Some of the top security challenges organizations have faced over…

Read article
Threat Modeling: 2022's Most In-Demand Cybersecurity Skill
Threat Modeling: 2022’s Most In-Demand Cybersecurity Skill

What Is Threat Modeling? Data breaches cost companies USD 8.64 million on average (Johnson, 2021), but many companies report they don’t have adequate protection against these vulnerabilities because there aren’t enough IT security professionals to help. The shortage of cybersecurity professionals leaves these organizations vulnerable to costly data breaches. Threat modeling is a technique cybersecurity…

Read article
Career in Cyber Threat Intelligence
Why to Pursue a Career in Cyber Threat Intelligence

Why to Pursue a Career in Cyber Threat Intelligence Cybercriminals are continually on the move, looking for ways to conduct cyberattacks and hack into networks across the globe. The annual cost associated with cybercrime damages equates to trillions of dollars each year, with experts predicting that global cybercrime damages will likely exceed USD 10.5 trillion…

Read article
DREAD Threat Modeling-Certified Threat Intelligence Analyst
DREAD Threat Modeling: An Introduction to Qualitative Risk Analysis

DREAD Threat Modeling: An Introduction to Qualitative Risk Analysis By 2025, the global cost of cybercrime is projected to reach an estimated $10.5 trillion (INTRUSION, Inc., 2020). With 30,000 websites hacked every day (Bulao, 2022), companies of all sizes need to prioritize cybersecurity. As the prevalence and costs of cybercrime skyrocket, organizations have developed a variety of…

Read article
Cyber Kill Chain What Are the Steps of a Cyberattack
The Cyber Kill Chain: The Seven Steps of a Cyberattack

The Cyber Kill Chain: The Seven Steps of a Cyberattack The Cyber Kill Chain framework, developed by Lockheed Martin (2022), explains how attackers move through networks to identify vulnerabilities that they can then exploit. Attackers use the steps in the Cyber Kill Chain when conducting offensive operations in cyberspace against their targets. If you’re responsible…

Read article