Behind the Scenes: CISOs and the Intelligence Community
Why would companies be recruiting and hiring information security executives from the Intelligence Community? The answer is in the intelligence discipline and how it applies to a holistic and effective security program.
How To Use The Intelligence Cycle To Secure Your Brand
The Intelligence Cycle in Action: A case study illustrating how the Intelligence Cycle enables intelligence and security professionals to establish a plan of action and execute on that plan to deliver a high-quality intelligence product to their clients.
How to Use Maltego to Conduct Threat Research
Maltego is an interactive, visual data mining and link analysis tool used to conduct online investigations through a library of plugins called “transforms.” In this guide, we'll show you how to use Maltego to do threat research within your own organization.