Cyber threat intelligence can be defined as the evolution of cyber threat information after it has been collected, evaluated, and assessed in the context of its origin, accuracy, and reliability, and after extensive analysis through rigorous and structured tradecraft...
In April this year, the intelligence community in the US issued a warning that adversarial entities were planning to target the country using cyberspace. States were wielding cyber operations as a means to achieve nefarious goals including causing destruction and...
As cyberattacks on critical infrastructure continue to rise it is important for operators connected with managing such infrastructure to adopt measures to improve the overall cybersecurity posture and plug gaps. Presented below are some of the interventions that...
With hackers deploying sophisticated breach tactics, the traditional way of keeping hackers outside the perimeter is no longer a viable strategy to prevent breachers. In the year 2020, based on the data we saw on the Dark Web, we were able to ascertain that stolen...