November 6, 2018The Death and Resurrection of Intel CutoutIntel CutOut was one of the few high-quality sources of sensitive information on the dark web. Given the high quality, relatively rare content, it seems that quite a few contributors were likely insiders in security/intel organizations. A number of breaches and security related threads appeared in Intel Cutout first or shortly after they were revealed […]
November 5, 2018Leaked Voter Databases Could be Weaponized for Election MeddlingOur Election Security Is Lacking New York State’s 2018 voter database was leaked and posted for free on a well-known forum about a week ago. The database included full name, physical address, previous addresses, date of birth, gender, voter ID, voter status, and voter history. Voter databases alone are not a huge threat. If a […]
October 10, 2017Behind the Scenes: CISOs and the Intelligence CommunityWhy would companies be recruiting and hiring information security executives from the Intelligence Community? The answer is in the intelligence discipline and how it applies to a holistic and effective security program.
October 9, 2017How To Use The Intelligence Cycle To Secure Your BrandThe Intelligence Cycle in Action: A case study illustrating how the Intelligence Cycle enables intelligence and security professionals to establish a plan of action and execute on that plan to deliver a high-quality intelligence product to their clients.
July 24, 2017How to Use Maltego to Conduct Threat ResearchMaltego is an interactive, visual data mining and link analysis tool used to conduct online investigations through a library of plugins called “transforms.” In this guide, we'll show you how to use Maltego to do threat research within your own organization.