November 6, 2018The Death and Resurrection of Intel CutoutIntel CutOut was one of the few high-quality sources of sensitive information on the dark web. Given the high quality, relatively rare content, it seems that quite a few contributors were likely insiders in security/intel organizations. A number of breaches and security related threads appeared in Intel Cutout first or shortly after they were revealed […]
November 5, 2018Leaked Voter Databases Could be Weaponized for Election MeddlingOur Election Security Is Lacking New York State’s 2018 voter database was leaked and posted for free on a well-known forum about a week ago. The database included full name, physical address, previous addresses, date of birth, gender, voter ID, voter status, and voter history. Voter databases alone are not a huge threat. If a […]
October 9, 2017How To Use The Intelligence Cycle To Secure Your BrandThe Intelligence Cycle in Action: A case study illustrating how the Intelligence Cycle enables intelligence and security professionals to establish a plan of action and execute on that plan to deliver a high-quality intelligence product to their clients.