Analysis Methodology
Attack Methodology
Cyber Kill Chain The basic premise of the the kill chain is to separate the attack into different stages, and that all stages must be complete for the attacker to complete their objective, If the chain of attack is broken, then in theory the whole attack is. This is not always true and we will […]
Threat Actors, Motivations and Capabilities
Its useful to remind ourselves of the common types of threat actors, their motivations and capabilities. Understanding this will help when we start to produce our hypotheses and Priority Intelligence Requirements. Different types of Threat Actors Hacktivists are driven by idealogical causes, sometimes social and political. In most cases they disagree with an idea and […]
Cyber Threat Intelligence Business imperative
Why do we need to perform intelligence-led security testing? And Cyber Threat Intelligence Organisations who operate in certain niches, for example Banking, Telecom or Government or those organisations who may operate in multiple countries of which could be hostile need to understand their threats in more details to tailor their security defences and ensure they […]