Adversary Intelligence: Getting Behind the Keyboard
Arguably one of the most controversial subjects in Threat Intelligence currently is the topic of Attribution, or developing Adversary Intelligence. Industry pundits will debate attribution with a...
View ArticleOPM Breach Analysis
Back in February, the ThreatConnect team conducted in-depth independent analysis of the Anthem breach, finding connections to amorphous Chinese APT activity. Although our primary concern at the time...
View ArticleOPM Breach Analysis: Update
As highlighted in our recent webinar with Rick Holland, when there is a security event of great magnitude, organizational leadership will want to know as much as possible about the technical WHAT and...
View ArticleThreat Intelligence and Risk Management: An Introduction
Several of us at ThreatConnect attended the Gartner Security & Risk Management Summit last week, which, conveniently took place right across the river from our home offices. I’m not sure if it’s...
View ArticleThreat Intelligence within the Risk Management Process
This is the second post in a series exploring the relationship of threat intelligence and risk management. If you missed the previous one, wherein I briefly explained why these two should “swipe right”...
View Article