Date Author Title
2022-11-10Xavier MertensDo you collect "Observables" or "IOCs"?
2018-11-11Pasquale StirparoCommunity contribution: joining forces or multiply solutions?
2018-10-17Russ McReeRedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence
2018-07-29Guy BruneauUsing RITA for Threat Analysis
2017-09-18Xavier MertensGetting some intelligence from malspam
2017-05-31Pasquale StirparoAnalysis of Competing Hypotheses, WCry and Lazarus (ACH part 2)
2017-05-28Pasquale StirparoAnalysis of Competing Hypotheses (ACH part 1)
2016-09-25Pasquale StirparoDefining Threat Intelligence Requirements
2016-07-31Pasquale StirparoSharing (intel) is caring... or not?
2016-05-02Rick WannerLean Threat Intelligence
2016-03-21Xavier MertensIP Addresses Triage
2015-08-16Guy BruneauAre you a "Hunter"?
2014-12-23John BambenekHow I learned to stop worrying and love malware DGAs....
2014-08-04Russ McReeThreats & Indicators: A Security Intelligence Lifecycle
2013-10-30Russ McReeSIR v15: Five good reasons to leave Windows XP behind
2013-07-19Stephen HallCyber Intelligence Tsunami
2013-07-18Chris MohanBlog Spam - annoying junk or a source of intelligence?
2013-04-23Russ McReeMicrosoft's Security Intelligence Report (SIRv14) released
2012-12-20Daniel WesemannWhite House strategy on security information sharing and safeguarding
2009-06-16John BambenekIran Internet Blackout: Using Twitter for Operational Intelligence
2009-01-31John BambenekGoogle Search Engine's Malware Detection Broken
2008-11-12John BambenekThoughts on Security Intelligence (McColo Corp alleged spam/malware host knocked offline)
2008-10-30Kevin ListonMaking Intelligence Actionable: Part 2