What is Proactive Threat Intelligence and Why Should I Care?
Lots of people talk about the value of threat intelligence for an organization trying to defend...
Using Proactive Intelligence Against Adversary Infrastructure
Organizations cannot and will never keep bad actors from breaching their perimeter: They’ll always...
A Recap of Cybersecurity in 2023 and What’s Ahead for 2024
With high-profile breaches in the news across the world and increasingly sophisticated threats,...
What Human Anatomy Can Teach Us About Cybersecurity
If you know me, you know that I love analogies. I find that they not only help people understand...
What Is Adversary Infrastructure?
Chasing Command-and-Control When companies and organizations started initially trying to determine...
10 Cybersecurity Trends That Emerged in 2023
Our digital world never stands still. How we do business and interact with each other is evolving...
But It Runs Really Fast
My uncle ran an advertising agency a long time ago, but I still remember one of his impactful ads....
Elevate Your Threat Hunting with JARM
The Evolving Cyber Threat Landscape We live in a world today where nefarious actors are...
The Secret to Cybersecurity Lies in Interrupting Causation Chains
Cybersecurity has never been more critical. The frequency and scope of cyberattacks like...
Critical Infrastructure Attacks: New Rules, New Game
Critical infrastructure lacking proper protection leaves itself open to a greater number of...
Cyber Adversary Infrastructure Explained
Cyber threat actors rely on infrastructure hidden to most people not looking for it. Revealing such...
Reflections on third-party validation of HYAS capabilties
It was the summer of 2019, and I spent an hour walking around downtown Los Altos in Silicon Valley...