September 24, 2018 | Content Aggregator - Single Slide | Threat Intelligence and Modeling
How can organizations best vet vendors providing intel on fraud, dark web chatter and geopolitical threats? In this Ask-an-Expert written response, IANS Faculty Jake Williams recommends several criteria but underscores that context is most critical.
Every IoC has a half life, but what is it exactly? In this Ask-an-Expert written response, IANS Faculty Mick Douglas offers tips for determining when an IoC has reached its end of useful life, as well as some rules of thumb for retiring them.
What's the best low- or no-cost way to get started with threat hunting? In this Ask-an-Expert written response, IANS Faculty Ken Van Wyk offers tips for uncovering the most common forms of system compromise and suggests places where tools and automation can help.
The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum walk through the framework’s components and how to put them to the best use when doing assessments in your organization.