This is the third article of 5 articles series on threat integrating threat intelligence into daily security operations. If you have not gone through the first two articles, then I highly recommend you reading that as all articles are connected to one another in a proper sequence. In this article, we are going to talk about phase 2 in which we will discuss what would be the intelligence collection strategy, methods and procedures. Here is article 1 and article 2.
Everything about threat intelligence, blue team, red team, pentesting, security audit, security review, testing and assessment.
Tuesday, September 17, 2019
Integrate Threat Intelligence program into your daily security operations - Phase 2 - Collecting Intelligence
Labels:
anonymous,
APT,
blueteam,
cyber,
cybersecurity,
darknet,
deepweb,
edr,
hacking,
informationsecurity,
infosec,
intelligence,
malware,
redteam,
security,
threat,
threathunting,
threatintelligence,
threats
Subscribe to:
Posts (Atom)