When I transitioned to a new career over a year ago, one of the many aspects I had to master, which considerably boosted my cybersecurity career, was how to conduct Threat Intelligence (TI). Threat intelligence involves the collection, processing, and analysis of data to gain a comprehensive understanding of a threat actor's attack patterns, most... Continue Reading →

