Authenticity

The Authenticity of Cyber Attribution – Who Do You Believe?

I have been thinking a lot lately about the accuracy of cyber attack attribution. Most cyber forensic analysts and threat intelligence specialists will tell you that cyber attack attribution done...

cyber intelligence based defenses

Intel-based Defenses

Intel-Based Defenses and Cyber Intelligence In my last post I talked about the six capability areas that comprise active cyber defense.  In this post, I will begin to break down...

cyber security pros investigating

Intel-Based Defenses Part 2

Sharing Cyber Intelligence Is No Longer An Option The rate of major data breaches across all industry verticals has reached alarming levels. The pace of these attacks is fueled by sophisticated...